Giter VIP home page Giter VIP logo

xsssniper's Introduction

XSSSNIPER

xsssniper is an handy xss discovery tool with mass scanning functionalities.

Usage:

Usage: xsssniper.py [options]

Options:
  -h, --help            show this help message and exit
  -u URL, --url=URL     target URL
  --post                try a post request to target url
  --data=POST_DATA      post data to use
  --threads=THREADS     number of threads
  --http-proxy=HTTP_PROXY
                        scan behind given proxy (format: 127.0.0.1:80)
  --tor                 scan behind default Tor
  --crawl               crawl target url for other links to test
  --forms               crawl target url looking for forms to test
  --user-agent=USER_AGENT
                        provide an user agent
  --random-agent        perform scan with random user agents
  --cookie=COOKIE       use a cookie to perform scans
  --dom                 basic heuristic to detect dom xss

Examples:

Scanning a single url with GET params:

$ python xsssniper.py -u "http://target.com/index.php?page=test"

Scanning a single url with POST params:

$ python xsssniper.py -u "http://target.com/index.php" --post --data=POST_DATA

Crawl a single url looking for forms to scan:

$ python xsssniper.py -u "http://target.com" --forms

Mass scan an entire website:

$ python xsssniper.py -u "http://target.com" --crawl

Mass scan an entire website forms included:

$ python xsssniper.py -u "http://target.com" --crawl --forms

Analyze target page javascripts (embedded and linked) to search for common sinks and sources:

$ python xsssniper.py -u "http://target.com" --dom

Thanks:

  • Miroslav Stamparm
  • Claudio Telmon

License

ISC License.

Copyright (c) 2012, Gianluca Brindisi < [email protected] >

Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

xsssniper's People

Contributors

bryant1410 avatar fgeek avatar gbrindisi avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

xsssniper's Issues

Crawl Errors and Scan Errors

Everytime I scan a site on XSSniper, it says right next to Remaining Targets, Crawl Errors, and next to Remaining URLS, it says Scan Errors.

Is there a glitch in XSSSniper or those websites just don't have an XSS vulnerability?

Python3

Should we migrate this project to Python 3? I do not think Python 2 support is must have. Could you tell me your opinion about this? Does some distro use xsssniper without Python 3?

Check availability of lxml

Currently if mechanize is missing xsssniper will say:

[X] Please install mechanize module:
    http://wwwsearch.sourceforge.net/mechanize/

But if lxml is missing it will say:

Traceback (most recent call last):
  File "xsssniper.py", line 6, in <module>
    from core.engine import Engine
  File "/home/hsalo/xsssniper/core/engine.py", line 24, in <module>
    from core.domscanner import DOMScanner
  File "/home/hsalo/xsssniper/core/domscanner.py", line 11, in <module>
    from lxml import etree
ImportError: No module named lxml

Maybe xsssniper should also give pip install -commands rather than per project URLs, but that is design decision. Also the import errors are checked several times. Is there a reason for that?

cookie format

why is good syntax for argument --cookie=?
i need example for COOKIE_DATA format.. ./xsssniper.py -u "blah.blah" --cookie=<how to write keys and values?>
thx

Package it

Eventually package xsssniper to have a simpler installation.

Ideally:

pip install xsssniper

Shebang problem

When executed without use the binary python, just using the Shebang specification in the file xsssniper.py, it throws an error like this:

$ python xsssniper.py --help
[X] Please install hgapi module:
   $ pip install 

$ ./xsssniper.py --help
./xsssniper.py: line 4: try:: command not found
./xsssniper.py: line 6: except: command not found
Warning: unknown mime-type for "\n[X] Please install hgapi module:" -- using "application/octet-stream"
Error: no such file "\n[X] Please install hgapi module:"
Warning: unknown mime-type for "   $ pip install \n" -- using "application/octet-stream"
Error: no such file "   $ pip install \n"
./xsssniper.py: line 11: syntax error near unexpected token `from'
./xsssniper.py: line 11: `from optparse import OptionParser'

The error was fixed just with a single character in the Shebang specification:

$ diff xsssniper.py xsssniper.py.fork 
1c1
< #/usr/bin/env python

---
> #!/usr/bin/env python

HTTP proxy functionality not working

As discussed in private email HTTP proxy functionality is not working. I have tested this with Burp and OWASP ZAP HTTP proxies with Git revision 73. I used these commands and no traffic is shown in logs of the proxy application:

xsssniper.py --http-proxy=127.0.0.1:8080 -u https://public-firing-range.appspot.com/
xsssniper.py --http-proxy=http://127.0.0.1:8080 -u https://public-firing-range.appspot.com/
xsssniper.py --http-proxy="http://127.0.0.1:8080" -u https://public-firing-range.appspot.com/

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.