diff --git a/README.md b/README.md index a37f65c..61b080f 100644 --- a/README.md +++ b/README.md @@ -30,7 +30,9 @@
### Why XSStrike? -Every XSS scanner out there has a list of payloads, they inject the payloads and if the payload is reflected into the webpage, it is declared vulnerable but that's just stupid. XSStrike on the other hand analyses the response with multiple parsers and then crafts payloads that are guaranteed to work. +XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler. + +Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work with context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike: ``` }]};(confirm)()//\ @@ -38,7 +40,7 @@ Here are some examples of the payloads generated by XSStrike: z