Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.
When I set workers to somewhat like high numbers, it gets locked to (Scanning 0/total_urls) and doesn't start scanning. Sometimes it happens even if I set workers to 30 while without workers it works fine.
You tool is awesome! Could you try to add a feature where we can insert custom header into all the HTTP Request? for example: sqlidetector -H "hacker1"