Basic Usage(Get):
python3 xsstrike.py --headers -u "http://localhost/vulnerabilities/xss_r/?name=asd"
Basic Usage(Post):
python xsstrike.py -u "http://example.com/search.php" --data "q=query"
Crawling(depth=2 default):
python xsstrike.py -u "http://example.com/page.php" --crawl -l 3
Find hidden parameters:
python xsstrike.py -u "http://example.com/page.php" --params
Extra:
--headers #Set custom headers (like cookies). It is necessary to set every time
--skip-poc
--skip-dom #Skip DOM XSS scanning