Skip to content
/ xssing Public

Xssing is a simple semantic analysis based on the location of the vulnerability, to determine the existence of the vulnerability, and use chromium to verify that xss is existed.

Notifications You must be signed in to change notification settings

keven1z/xssing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

XSSING

xssing是一个根据参数存在位置构造payload,并结合chromium保证xss的正确率。

安装

环境要求

python 3.7及以上

安装步骤

运行 pip3 install -r reqirements.txt

Usage

XSSING选项信息

python3 xssing.py -h
usage: xssing.py [-h] [--version] [-v VERBOSE] [-u URL] [-r REQUESTFILE]
                 [--method METHOD] [--user-agent AGENT] [--data DATA]
                 [--cookie COOKIE] [-p PARAMETER] [--prefix PREFIX]
                 [--suffix SUFFIX] [--test-all] [--level LEVEL]
                 [--sleep SLEEP]

optional arguments:
  -h, --help          show this help message and exit
  --version           Show program's version number and exit
  -v VERBOSE          Verbosity level: 0-1 (default 0)

Target:
  At least one of these options has to be provided to define the target(s)

  -u URL, --url URL   Target URL (e.g. "http://www.site.com/vuln.php?id=1")
  -r REQUESTFILE      Load HTTP request from a file

Request:
  These options can be used to specify how to connect to the target URL

  --method METHOD     Force usage of given HTTP method (e.g. PUT)
  --user-agent AGENT  HTTP User-Agent header value
  --data DATA         Data string to be sent through POST (e.g. "id=1")
  --cookie COOKIE     HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")

Injection:
  These options can be used to specify which parameters to test for, provide
  custom injection payloads and optional tampering scripts

  -p PARAMETER        Testable parameter(s)
  --prefix PREFIX     Injection payload prefix string
  --suffix SUFFIX     Injection payload suffix string

Detection:
  These options can be used to customize the detection phase

  --test-all          test all payload
  --level LEVEL       Level of tests to perform (1-2, default 1)

Optimization:
  These options can be used to optimize the performance of xssing

  --sleep SLEEP       Seconds to wait before check (default 0)

EXAMPLE

example

About

Xssing is a simple semantic analysis based on the location of the vulnerability, to determine the existence of the vulnerability, and use chromium to verify that xss is existed.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages