2018-10-27 18:59:47 +05:30
< h1 align = "center" >
< br >
< a href = "https://github.com/s0md3v/XSStrike" > < img src = "https://image.ibb.co/cpuYoA/xsstrike-logo.png" alt = "XSStrike" > < / a >
< br >
XSStrike
< br >
< / h1 >
< h4 align = "center" > Advanced XSS Detection Suite< / h4 >
< p align = "center" >
< a href = "https://github.com/s0md3v/XSStrike/releases" >
< img src = "https://img.shields.io/github/release/s0md3v/XSStrike.svg" >
< / a >
< a href = "https://travis-ci.com/s0md3v/XSStrike" >
< img src = "https://img.shields.io/travis/com/s0md3v/XSStrike.svg" >
< / a >
< a href = "https://github.com/s0md3v/XSStrike/issues?q=is%3Aissue+is%3Aclosed" >
< img src = "https://img.shields.io/github/issues-closed-raw/s0md3v/XSStrike.svg" >
< / a >
< / p >
2018-11-19 14:30:25 +05:30

2018-10-27 19:08:11 +05:30
< p align = "center" >
< a href = "https://github.com/s0md3v/XSStrike/wiki" > XSStrike Wiki< / a > •
2018-10-27 19:18:02 +05:30
< a href = "https://github.com/s0md3v/XSStrike/wiki/Usage" > Usage< / a > •
2018-10-31 12:59:54 +05:30
< a href = "https://github.com/s0md3v/XSStrike/wiki/FAQ" > FAQ< / a > •
2018-11-12 04:37:46 +05:30
< a href = "https://github.com/s0md3v/XSStrike/wiki/For-Developers" > For Developers< / a > •
2018-10-27 19:08:11 +05:30
< a href = "https://github.com/s0md3v/XSStrike/wiki/Compatibility-&-Dependencies" > Compatibility< / a > •
< a href = "https://github.com/s0md3v/XSStrike #gallery " > Gallery</ a >
< / p >
2018-10-30 10:06:43 +05:30
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.
2018-11-10 18:52:36 +05:30
Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine.
2018-10-27 18:59:47 +05:30
Here are some examples of the payloads generated by XSStrike:
```
}]};(confirm)()//\
< A % 0aONMouseOvER % 0d = %0d[8].find(confirm) > z
< /tiTlE/>< a % 0donpOintErentER % 0d = %0d(prompt)`` > z
< /SCRiPT/>< DETAILs / + / onpoINTERenTEr % 0a = %0aa=prompt,a()//
```
2018-10-30 10:06:43 +05:30
Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detection capabilities as well. It also scans for DOM XSS vulnerabilities.
2018-10-27 18:59:47 +05:30
### Main Features
2018-11-13 22:28:09 +05:30
- Reflected and DOM XSS scanning
2018-10-30 10:10:44 +05:30
- Multi-threaded crawling
2018-10-27 18:59:47 +05:30
- Context analysis
2018-11-13 22:28:09 +05:30
- Configurable core
2018-10-27 18:59:47 +05:30
- WAF detection & evasion
2019-04-06 21:46:54 +05:30
- Outdated JS lib scanning
2018-11-13 22:28:09 +05:30
- Intelligent payload generator
2018-10-27 18:59:47 +05:30
- Handmade HTML & JavaScript parser
- Powerful fuzzing engine
2018-11-13 22:28:09 +05:30
- Blind XSS support
- Highly researched work-flow
- Complete HTTP support
2018-11-12 21:23:29 +05:30
- Bruteforce payloads from a file
2018-10-27 18:59:47 +05:30
- Powered by [Photon ](https://github.com/s0md3v/Photon ), [Zetanize ](https://github.com/s0md3v/zetanize ) and [Arjun ](https://github.com/s0md3v/Arjun )
2018-11-13 16:48:11 +05:30
- Payload Encoding
2018-10-27 18:59:47 +05:30
2018-10-30 10:06:43 +05:30
### Documentation
- [Usage ](https://github.com/s0md3v/XSStrike/wiki/Usage )
2018-10-30 10:10:44 +05:30
- [Compatibility & Dependencies ](https://github.com/s0md3v/XSStrike/wiki/Compatibility-&-Dependencies )
2018-10-30 10:06:43 +05:30
2018-10-31 12:59:54 +05:30
### FAQ
2018-11-12 10:00:56 +05:30
- [It says fuzzywuzzy isn't installed but it is. ](https://github.com/s0md3v/XSStrike/wiki/FAQ#it-says-fuzzywuzzy-is-not-installed-but-its )
2018-11-14 01:10:57 +05:30
- [What's up with Blind XSS? ](https://github.com/s0md3v/XSStrike/wiki/FAQ#whats-up-with-blind-xss )
2018-10-31 12:59:54 +05:30
- [Why XSStrike boasts that it is the most advanced XSS detection suite? ](https://github.com/s0md3v/XSStrike/wiki/FAQ#why-xsstrike-boasts-that-it-is-the-most-advanced-xss-detection-suite )
2018-11-10 18:52:36 +05:30
- [I like the project, what enhancements and features I can expect in future? ](https://github.com/s0md3v/XSStrike/wiki/FAQ#i-like-the-project-what-enhancements-and-features-i-can-expect-in-future )
2018-11-21 20:21:59 +05:30
- [What's the false positive/negative rate? ](https://github.com/s0md3v/XSStrike/wiki/FAQ#whats-the-false-positivenegative-rate )
2018-10-31 12:59:54 +05:30
- [Tool xyz works against the target, while XSStrike doesn't! ](https://github.com/s0md3v/XSStrike/wiki/FAQ#tool-xyz-works-against-the-target-while-xsstrike-doesnt )
- [Can I copy it's code? ](https://github.com/s0md3v/XSStrike/wiki/FAQ#can-i-copy-its-code )
- [What if I want to embed it into a proprietary software? ](https://github.com/s0md3v/XSStrike/wiki/FAQ#what-if-i-want-to-embed-it-into-a-proprietary-software )
2018-10-27 19:08:11 +05:30
### Gallery
2018-10-27 18:59:47 +05:30
#### DOM XSS
2018-11-19 14:30:25 +05:30

2018-10-27 18:59:47 +05:30
#### Reflected XSS
2018-11-19 14:30:25 +05:30

2018-10-27 18:59:47 +05:30
#### Crawling
2018-11-19 14:30:25 +05:30

2018-11-10 18:52:36 +05:30
#### Fuzzing
2018-11-19 14:30:25 +05:30

2018-11-12 21:23:29 +05:30
#### Bruteforcing payloads from a file
2018-11-19 14:30:25 +05:30

2018-10-27 18:59:47 +05:30
#### Interactive HTTP Headers Prompt
2018-11-19 14:30:25 +05:30

2018-11-12 21:23:29 +05:30
#### Hidden Parameter Discovery
2018-11-19 14:30:25 +05:30

2018-10-27 19:18:02 +05:30
2018-11-14 23:31:35 +05:30
### Contribution, Credits & License
Ways to contribute
- Suggest a feature
- Report a bug
- Fix something and open a pull request
- Create a browser extension
- Create a burp suite/zaproxy plugin
- Help me document the code
- Spread the word
2018-10-27 19:18:02 +05:30
2018-11-11 22:26:33 +01:00
Licensed under the GNU GPLv3, see [LICENSE ](LICENSE ) for more information.
2018-11-14 23:31:35 +05:30
2019-04-06 21:46:54 +05:30
The WAF signatures in `/db/wafSignatures.json` are taken & modified from [sqlmap ](https://github.com/sqlmapproject/sqlmap ). I extracted them from sqlmap's waf detection modules which can found [here ](https://github.com/sqlmapproject/sqlmap/blob/master/waf/ ) and converted them to JSON.\
`/plugins/retireJS.py` is a modified version of [retirejslib ](https://github.com/FallibleInc/retirejslib/ ).