{"id":528,"date":"2007-06-05T06:03:09","date_gmt":"2007-06-05T06:03:09","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2007\/06\/sqlbrute-sql-injection-brute-force-tool\/"},"modified":"2015-09-09T19:40:09","modified_gmt":"2015-09-09T11:40:09","slug":"sqlbrute-sql-injection-brute-force-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2007\/06\/sqlbrute-sql-injection-brute-force-tool\/","title":{"rendered":"SQLBrute – SQL Injection Brute Force Tool"},"content":{"rendered":"

[ad]<\/p>\n

SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Microsoft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn’t require non-standard libraries (there is some code in there for pycurl, but it is disabled because it isn’t finished).<\/p>\n

For error based SQL injection, SQLBrute should work, if you can either:<\/p>\n