# ronin-vulns-sqli 1 "May 2022" Ronin "User Manuals" ## SYNOPSIS `ronin-vulns sqli` [*options*] {*URL* ... \| `--input` *FILE*} ## DESCRIPTION Scans URL(s) for SQL injection (SQLi) vulnerabilities. The URLs to scan can be given as additional arguments or read from a file using the `--input` option. ## ARGUMENTS *URL* A URL to scan. ## OPTIONS `--first` Only find the first vulnerability for each URL. `-A`, `--all` Find all vulnerabilities for each URL. `-H`, `--header` "*Name*: *value*" Sets an additional header using the given *Name* and *value*. `-C`, `--cookie` *COOKIE* Sets the raw `Cookie` header. `-c`, `--cookie-param` *NAME*`=`*VALUE* Sets an additional `Cookie` param using the given *NAME* and *VALUE*. `-R`, `--referer` *URL* Sets the `Referer` header. `-F`, `--form-param` *NAME*`=`*VALUE* Sets an additional form param using the given *NAME* and *VALUE*. `--test-query-param` *NAME* Tests the URL query param name. `--test-all-query-params` Test all URL query param names. `--test-header-name` *NAME* Tests the HTTP Header name. `--test-cookie-param` *NAME* Tests the HTTP Cookie name. `--test-all-cookie-params` Test all Cookie param names. `--test-form-param` *NAME* Tests the form param name. `-i`, `--input` *FILE* Reads URLs from the given *FILE*. `-Q`, `--escape-quote` Escapes quotation marks. `-P`, `--escape-parens` Escapes parenthesis. `-T`, `--terminate` Terminates the SQL expression with a `--`. `-h`, `--help` Print help information. ## AUTHOR Postmodern ## SEE ALSO ronin-vulns-scan(1)