From 37cab5917739f81bb0c5294deaec862c2f80cf34 Mon Sep 17 00:00:00 2001 From: Somdev Sangwan Date: Sat, 10 Nov 2018 18:52:36 +0530 Subject: [PATCH] stable release --- README.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 20b52da..e0bc517 100644 --- a/README.md +++ b/README.md @@ -32,7 +32,7 @@ XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler. -Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work with context analysis integrated with a fuzzing engine. +Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike: ``` }]};(confirm)()//\ @@ -63,6 +63,7 @@ Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detect ### FAQ - [Why XSStrike boasts that it is the most advanced XSS detection suite?](https://github.com/s0md3v/XSStrike/wiki/FAQ#why-xsstrike-boasts-that-it-is-the-most-advanced-xss-detection-suite) +- [I like the project, what enhancements and features I can expect in future?](https://github.com/s0md3v/XSStrike/wiki/FAQ#i-like-the-project-what-enhancements-and-features-i-can-expect-in-future) - [How does XSStrike decide if the injection was successful without a browser engine?](https://github.com/s0md3v/XSStrike/wiki/FAQ#how-does-xsstrike-decide-if-the-injection-was-successful-without-a-browser-engine) - [Does that mean it doesn't have false negatives or false positives?](https://github.com/s0md3v/XSStrike/wiki/FAQ#does-that-mean-it-doesnt-have-false-negatives-or-false-positives) - [Tool xyz works against the target, while XSStrike doesn't!](https://github.com/s0md3v/XSStrike/wiki/FAQ#tool-xyz-works-against-the-target-while-xsstrike-doesnt) @@ -77,13 +78,14 @@ Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detect ![multi xss](https://image.ibb.co/gR1ToA/Screenshot-2018-10-27-11-18-43.png) #### Crawling ![crawling](https://image.ibb.co/iAWNFq/Screenshot-2018-10-27-16-20-36.png) +#### Fuzzing +![fuzzing](https://image.ibb.co/mjqgsq/Screenshot-2018-11-10-18-50-49.png) #### Hidden Parameter Discovery ![arjun](https://image.ibb.co/bOAD5q/Screenshot-2018-10-27-18-16-37.png) #### Interactive HTTP Headers Prompt ![headers](https://image.ibb.co/jw5NgV/Screenshot-2018-10-27-18-45-32.png) ### Contribution & License -XSStrike v3.0 is in beta phase at present and has been released for public testing.
Useful issues and pull requests are appreciated. I haven't decided a license yet.