From a2f2602d7a4f9049fd76d47444f453e3a179eab6 Mon Sep 17 00:00:00 2001 From: Somdev Sangwan Date: Sat, 27 Oct 2018 19:08:11 +0530 Subject: [PATCH] Update README.md --- README.md | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 201723f..40da5c8 100644 --- a/README.md +++ b/README.md @@ -20,6 +20,15 @@

+![multi xss](https://image.ibb.co/gR1ToA/Screenshot-2018-10-27-11-18-43.png) + +

+ XSStrike Wiki • + How To Use • + Compatibility • + Gallery +

+ ### Why XSStrike? Every XSS scanner out there has a list of payloads, it injectes the payloads and if the payload is reflected into the webpage, it is declared vulnerable but that's just stupid. XSStrike on the other hand analyses the response with multiple parsers and then crafts payloads that are guaranteed to work. Here are some examples of the payloads generated by XSStrike: @@ -36,6 +45,7 @@ Apart from that, XSStrike has crawling, fuzzing, WAF detection capabilities as w - Multithreaded crawling - Context analysis - Configurable Core +- Highly Researched Workflow - WAF detection & evasion - Handmade HTML & JavaScript parser - Powerful fuzzing engine @@ -43,7 +53,7 @@ Apart from that, XSStrike has crawling, fuzzing, WAF detection capabilities as w - Complete HTTP Support - Powered by [Photon](https://github.com/s0md3v/Photon), [Zetanize](https://github.com/s0md3v/zetanize) and [Arjun](https://github.com/s0md3v/Arjun) -### Screenshots +### Gallery #### DOM XSS ![dom xss](https://image.ibb.co/d1rpvq/Screenshot-2018-10-27-10-59-43.png) #### Reflected XSS