项目作者: s0md3v

项目描述 :
Most advanced XSS scanner.
高级语言: Python
项目地址: git://github.com/s0md3v/XSStrike.git
创建时间: 2017-06-26T07:24:44Z
项目社区:https://github.com/s0md3v/XSStrike

开源协议:GNU General Public License v3.0

下载





XSStrike


XSStrike


Advanced XSS Detection Suite











multi xss


XSStrike Wiki
Usage
FAQ
For Developers
Compatibility
Gallery

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.

Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine.
Here are some examples of the payloads generated by XSStrike:

  1. }]};(confirm)()//\
  2. <A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
  3. </tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
  4. </SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//

Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detection capabilities as well. It also scans for DOM XSS vulnerabilities.

Sponsored By

Website: https://iproyal.com/?r=800974

Main Features

  • Reflected and DOM XSS scanning
  • Multi-threaded crawling
  • Context analysis
  • Configurable core
  • WAF detection & evasion
  • Outdated JS lib scanning
  • Intelligent payload generator
  • Handmade HTML & JavaScript parser
  • Powerful fuzzing engine
  • Blind XSS support
  • Highly researched work-flow
  • Complete HTTP support
  • Bruteforce payloads from a file
  • Powered by Photon, Zetanize and Arjun
  • Payload Encoding

Installation

Enter the following commands one by one in terminal:

  1. git clone https://github.com/s0md3v/XSStrike
  2. cd XSStrike
  3. pip install -r requirements.txt --break-system-packages

Now, XSStrike can be used at any time as follows:

  1. python xsstrike.py

Documentation

FAQ

DOM XSS

dom xss

Reflected XSS

multi xss

Crawling

crawling

Fuzzing

fuzzing

Bruteforcing payloads from a file

bruteforcing

Interactive HTTP Headers Prompt

headers

Hidden Parameter Discovery

arjun

Contribution, Credits & License

Ways to contribute

  • Suggest a feature
  • Report a bug
  • Fix something and open a pull request
  • Help me document the code
  • Spread the word

Licensed under the GNU GPLv3, see LICENSE for more information.

The WAF signatures in /db/wafSignatures.json are taken & modified from sqlmap. I extracted them from sqlmap’s waf detection modules which can found here and converted them to JSON.\
/plugins/retireJS.py is a modified version of retirejslib.