Blind XSS Support
This commit is contained in:
11
README.md
11
README.md
@@ -44,16 +44,17 @@ Here are some examples of the payloads generated by XSStrike:
|
||||
Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detection capabilities as well. It also scans for DOM XSS vulnerabilities.
|
||||
|
||||
### Main Features
|
||||
- Reflected and DOM XSS Scanning
|
||||
- Reflected and DOM XSS scanning
|
||||
- Multi-threaded crawling
|
||||
- Context analysis
|
||||
- Configurable Core
|
||||
- Highly Researched Work-flow
|
||||
- Configurable core
|
||||
- WAF detection & evasion
|
||||
- Intelligent payload generator
|
||||
- Handmade HTML & JavaScript parser
|
||||
- Powerful fuzzing engine
|
||||
- Intelligent payload generator
|
||||
- Complete HTTP Support
|
||||
- Blind XSS support
|
||||
- Highly researched work-flow
|
||||
- Complete HTTP support
|
||||
- Bruteforce payloads from a file
|
||||
- Powered by [Photon](https://github.com/s0md3v/Photon), [Zetanize](https://github.com/s0md3v/zetanize) and [Arjun](https://github.com/s0md3v/Arjun)
|
||||
- Payload Encoding
|
||||
|
||||
Reference in New Issue
Block a user