Shifted documentation to project website.
This commit is contained in:
55
README.md
55
README.md
@@ -1,9 +1,9 @@
|
||||
<p align="middle"><img src='https://i.imgur.com/TKMnPRJ.png' /></p>
|
||||
|
||||
<a href="http://teamultimate.in"></a>   
|
||||
<a href="http://xsstrike.tk"></a>   
|
||||
|
||||
# XSStrike
|
||||
XSStrike is a python script designed to detect and exploit XSS vulnerabilites.
|
||||
XSStrike is a python script designed to detect and exploit XSS vulnerabilites. Visit XSStrike's [project site](http://xsstrike.tk/) for more info.
|
||||
|
||||
A list of features XSStrike has to offer:
|
||||
|
||||
@@ -17,6 +17,8 @@ A list of features XSStrike has to offer:
|
||||
- [x] Negligible number of false positives
|
||||
- [x] Opens the POC in a browser window
|
||||
|
||||
<img src='https://i.imgur.com/oWVlUjs.png' />
|
||||
|
||||
### Installing XSStrike
|
||||
Use the following command to download it
|
||||
```
|
||||
@@ -34,50 +36,13 @@ Now you are good to go! Run XSStrike with the following command
|
||||
```
|
||||
python xsstrike
|
||||
```
|
||||
## Using XSStrike
|
||||
### Using XSStrike
|
||||
You can enter <b>help</b> in XSStrike's target prompt for basic usages.
|
||||
|
||||

|
||||
You can view XSStrike's complete documentation [here](http://xsstrike.tk/Documentation/).
|
||||
|
||||
You can enter your target URL now but remember, you have to mark the most crucial parameter by inserting "d3v<" in it.
|
||||
|
||||
For example: target.com/search.php?q=d3v&category=1
|
||||
|
||||
After you enter your target URL, XSStrike will check if the target is protected by a WAF or not.
|
||||
If its not protected by WAF you will get three options
|
||||
|
||||
<b>1. Fuzzer:</b> It checks how the input gets reflected in the webpage and then tries to build a payload according to that.
|
||||
|
||||

|
||||
|
||||
<b>2. Striker:</b> It bruteforces all the parameters one by one and generates the proof of concept in a browser window.
|
||||
|
||||

|
||||
|
||||
<b>3. Spider:</b> It extracts all the links present in homepage of the target and checks parameters in them for XSS.
|
||||
|
||||
<img src='https://i.imgur.com/2oyYu5j.png' />
|
||||
|
||||
<b>4. Hulk:</b> Hulk uses a different approach, it doesn't care about reflection of input. It has a list of polyglots and solid payloads, it just enters them one by one in the target parameter and opens the resulted URL in a browser window.
|
||||
|
||||

|
||||
|
||||
XSStrike can also bypass WAFs
|
||||
|
||||

|
||||
|
||||
XSStrike supports POST method too
|
||||
|
||||

|
||||
|
||||
You can also supply cookies to XSStrike
|
||||
|
||||
<img src='https://i.imgur.com/PwCRUgB.png' />
|
||||
|
||||
Unlike other stupid bruteforce programs, XSStrike has a small list of payloads but they are the best one. Most of them are carefully crafted by me.
|
||||
If you find any bug or have any suggestion to make the program better please let me know on Ultimate Hacker's [facebook page](https://www.facebook.com/weareultimates) or start an issue on XSStrike's Github repository.
|
||||
### Demo video
|
||||
<a href="https://youtu.be/8R_5EjIeFe4" target="_blank"><img src="http://teamultimate.in/wp-content/uploads/2017/06/Screenshot-from-2017-06-29-16-59-48.png"
|
||||
alt="watch xsstrike in action" border="10" /></a>
|
||||
## Are you a Developer?
|
||||
If you are a developer and want to use XSStrike's code in your project or want to contribute to XSStrike then you should read the [developer guide](http://xsstrike.tk/For-Developers/).
|
||||
|
||||
#### Credits
|
||||
XSStrike uses code from [BruteXSS](https://github.com/shawarkhanethicalhacker/BruteXSS) and [Intellifuzzer-XSS](https://github.com/matthewdfuller/intellifuzz-xss), <a href="https://github.com/The404Hacking/XsSCan">XsSCan</a>.
|
||||
XSStrike uses code from [BruteXSS](https://github.com/shawarkhanethicalhacker/BruteXSS), [Intellifuzzer-XSS](https://github.com/matthewdfuller/intellifuzz-xss) and [XsScan](https://github.com/The404Hacking/XsSCan), [WAFNinja](https://github.com/khalilbijjou/WAFNinja/).
|
||||
|
||||
Reference in New Issue
Block a user