xss

XSSCrapy

XSStrike

  • Cross Site Scripting detection suite equipped with parsers.

  • XSStrike analyzes the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine.

Documentation

XSStrike Documentation

Usage Commands

Classical GET: python xsstrike.py -u "http://example.com/search.php?q=query"

POST: python xsstrike.py -u "http://example.com/search.php" --data "q=query"

Path payloads: python xsstrike.py -u "http://example.com/search/form/query" --path

Crawl and test: python xsstrike.py -u "http://example.com/page.php" --crawl

Load payloads from file and test them: python3 xsstrike.py -u "http://example.com/page.php?q=query" -f /path/to/file.txt

Find hidden parameters: python xsstrike.py -u "http://example.com/page.php" --params

method uniq

https://github.com/yavolo/eventlistener-xss-recon

Method 1: Unique

Method 2: CleanP and InjectP

Method 4

Tips

  • If XSS is not executed through the UI, you can try to insert it through the API

  • It can then fire on the UI. Many filters are not present like this

Payloads

Last updated