-
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
FAQ
Well it's because XSStrike runs on python3 and you have to install the module with pip3
as follows:
pip3 install fuzzywuzzy
Register on xsshunter.com, copy your payload in /core/config.py
within blindPayload
variable. That's it.
Then you can use the --blind
option while crawling to make XSStrike inject your blind XSS payload in each parameter of each form.
Because it is.
To see what is being worked on, check the development board of XSStrike. XSStrike will get the following updates in near future:
- Dynamic JS parsing for better DOM XSS scanning
- A dedicated filter bypassing engine
- Enhanced WAF evasion capabilities by WAF rules reversing
- Proxy support
Because it knows what it is doing. It crafts payloads itself based on the context of the reflection, then it injects a payload only if the characters included in the payload are not being escaped. After injecting the payload, it compares the reflected string with the injected string using levenshtein algorithm.
When XSStrike outputs a payload, it also prints it's two properties:
- Efficiency: The similarity between reflected and injected string
0%-100%
- Confidence: Confidence of developer on the payload,
0-10
If a payload has confidence 10
and it's efficiency is 100%. It will work for sure.
Payloads with efficiency less than 95 isn't not even printed on screen, so confidence is the measure you should have faith in.
Lower confidence = lesser chances of working.
Please use that other tool.
Yes, as long as you state changes and release your software under the same license. For more information, please read the license. If you don't follow the conditions, you might get into trouble.
You can mail me s0md3v@gmail.com to buy a license.