Comment on page
XSS Tools
- Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access to the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!
git clone https://github.com/s0md3v/XSStrike.git
cd XSStrike
pip install -r requirements.txt
python xsstrike.py
python xsstrike.py -u "http://SERVER_IP:PORT/index.php?task=test"
Basic Usage(Get):
python3 xsstrike.py --headers -u "http://localhost/vulnerabilities/xss_r/?name=asd"
Basic Usage(Post):
python xsstrike.py -u "http://example.com/search.php" --data "q=query"
Crawling(depth=2 default):
python xsstrike.py -u "http://example.com/page.php" --crawl -l 3
Find hidden parameters:
python xsstrike.py -u "http://example.com/page.php" --params
Extra:
--headers #Set custom headers (like cookies). It is necessary to set every time
--skip-poc
--skip-dom #Skip DOM XSS scanning
git clone https://github.com/rajeshmajumdar/BruteXSS
Tool to find vulnerable (GET or POST) parameter to XSS using a list of payloads with a GUI.
Custom headers (like cookies) can not be configured.
Basic Usage(Get):
The tool doesnt send the payload:(
git clone https://github.com/DanMcInerney/xsscrapy
Not recommended. A lot of unnecessary output, and it doesn`t work properly.
- Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access to the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!
Last modified 7mo ago