Skip to content

Latest commit

 

History

History
134 lines (112 loc) · 6.3 KB

README.md

File metadata and controls

134 lines (112 loc) · 6.3 KB


XSStrike
XSStrike

Advanced XSS Detection Suite

multi xss

XSStrike WikiUsageFAQFor DevelopersCompatibilityGallery

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.

Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:

}]};(confirm)()//\
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//

Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detection capabilities as well. It also scans for DOM XSS vulnerabilities.

Main Features

  • Reflected and DOM XSS scanning
  • Multi-threaded crawling
  • Context analysis
  • Configurable core
  • WAF detection & evasion
  • Outdated JS lib scanning
  • Intelligent payload generator
  • Handmade HTML & JavaScript parser
  • Powerful fuzzing engine
  • Blind XSS support
  • Highly researched work-flow
  • Complete HTTP support
  • Bruteforce payloads from a file
  • Powered by Photon, Zetanize and Arjun
  • Payload Encoding

INSTALLATION

To install XSStrike, you can follow these steps:

Step 1: Open a terminal on your system.

Step 2: Clone the XSStrike repository from GitHub by running the following command:

git clone https://github.com/s0md3v/XSStrike.git

Step 3: Navigate to the XSStrike directory using the cd command:

cd XSStrike

Step 4: Install the required dependencies using pip (Python package installer). If you don't have pip installed, you can refer to the official pip documentation (https://pip.pypa.io/en/stable/installing/) for instructions on how to install pip on your system.

pip install -r requirements.txt

Step 5: XSStrike should now be installed on your system. You can run XSStrike by executing the following command:

python xsstrike.py

After executing the command, the XSStrike interface will be launched, and you can start using it to scan for XSS vulnerabilities.

Please note that XSStrike is a command-line tool and requires Python to be installed on your system. Ensure that you have Python installed and the appropriate version required by XSStrike.

Documentation

FAQ

Gallery

DOM XSS

dom xss

Reflected XSS

multi xss

Crawling

crawling

Fuzzing

fuzzing

Bruteforcing payloads from a file

bruteforcing

Interactive HTTP Headers Prompt

headers

Hidden Parameter Discovery

arjun

Contribution, Credits & License

Ways to contribute

  • Suggest a feature
  • Report a bug
  • Fix something and open a pull request
  • Help me document the code
  • Spread the word

Licensed under the GNU GPLv3, see LICENSE for more information.

The WAF signatures in /db/wafSignatures.json are taken & modified from sqlmap. I extracted them from sqlmap's waf detection modules which can found here and converted them to JSON.
/plugins/retireJS.py is a modified version of retirejslib.