# DSSS **Repository Path**: mirrors_stamparm/DSSS ## Basic Information - **Project Name**: DSSS - **Description**: Damn Small SQLi Scanner - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2022-01-07 - **Last Updated**: 2026-03-30 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README Damn Small SQLi Scanner [![Python 3.x](https://img.shields.io/badge/python-3.x-yellow.svg)](https://www.python.org/) [![License](https://img.shields.io/badge/license-Public_domain-red.svg)](https://wiki.creativecommons.org/wiki/Public_domain) ========= **Damn Small SQLi Scanner** (DSSS) is a fully functional [SQL injection](https://en.wikipedia.org/wiki/SQL_injection) vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code. ![Vulnerable](http://i.imgur.com/7mXeXjF.png) As of optional settings it supports HTTP proxy together with HTTP header values `User-Agent`, `Referer` and `Cookie`. Sample runs ---- ``` $ python3 dsss.py -h Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.3a by: Miroslav Stampar (@stamparm) Usage: dsss.py [options] Options: --version show program's version number and exit -h, --help show this help message and exit -u URL, --url=URL Target URL (e.g. "http://www.target.com/page.php?id=1") --data=DATA POST data (e.g. "query=test") --cookie=COOKIE HTTP Cookie header value --user-agent=UA HTTP User-Agent header value --referer=REFERER HTTP Referer header value --proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080") ``` ``` $ python3 dsss.py -u "http://testphp.vulnweb.com/artists.php?artist=1" Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.3a by: Miroslav Stampar (@stamparm) * scanning GET parameter 'artist' (i) GET parameter 'artist' could be error SQLi vulnerable (MySQL) (i) GET parameter 'artist' appears to be blind SQLi vulnerable (e.g.: 'http://t estphp.vulnweb.com/artists.php?artist=1%20AND%2061%3E60') scan results: possible vulnerabilities found ``` Requirements ---- [Python](http://www.python.org/download/) version **3.x** is required for running this program.