Skip to content

A tool that fully automates XSS search by linking the most reliable crawling and scanning tools

Notifications You must be signed in to change notification settings

achufistov/rxssplorer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

RXSSplorer


Table of Contents


  1. Introduction
  2. Usage
  3. Example Use Cases
  4. Tools Used
  5. Installation

Introduction


RXSSplorer collects reflected parameters potentially suitable for injection from various crawler tools and then tries to catch alert() from your proposed payload using qsreplace, airixss and kxss.

Usage


To use the Reflected XSS Scanner, simply run the main.py script:

python3 main.py -h                                   
usage: main.py [-h] [-u URL] [-uf URLS_FILE] [-p PAYLOAD] [-pf PAYLOADS_FILE] [-o {txt,html}] [-H HEADERS]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     URL to scan
  -uf URLS_FILE, --urls-file URLS_FILE
                        File containing URLs to scan
  -p PAYLOAD, --payload PAYLOAD
                        Payload to use
  -pf PAYLOADS_FILE, --payloads-file PAYLOADS_FILE
                        File containing payloads to use
  -o {txt,html}, --output {txt,html}
                        Output format (txt/html)
  -H HEADERS, --headers HEADERS
                        HTTP headers to pass to airixss (e.g., 'header1: value1,header2: value2')

Example Use Cases

Scanning a single URL using a single payload

To scan a single URL, use the following command:

python3 main.py -u http://testphp.vulnweb.com/ -p '<your payload>'

Scanning Multiple URLs using multiple payloads

Do it this way:

python3 main.py -uf urls.txt -pf payloads.txt

Selecting the file format with the scan results

So far, txt and html formats are available. Txt will be generated by default, so if you want to get the data in html format:

python3 main.py -uf urls.txt -pf payloads.txt -o html

You will receive the following message after the scan is completed:

The work is over. You can get acquainted with all vulnerable endpoints here: results.{txt or html depending on your choice}

Tools Used

If you want to understand the operation of each tool from this zoo, you can do it here:

  1. airixss
  2. kxss
  3. gau
  4. hakrawler
  5. katana
  6. waybackurls
  7. qsreplace
  8. uro

Installation

  1. cd to rxssplorer directory;
  2. Install requirements: pip3 install -r requirements.txt
  3. Install each tool listed in the paragraph above

P.S. an installation script will be here soon

About

A tool that fully automates XSS search by linking the most reliable crawling and scanning tools

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages