on
BruteXSS - Cross-Site Scripting BruteForcer
Author: Shawar Khan
The BruteXSS project is sponsored and supported by Netsparker Web Application Security Scanner
Disclaimer: I am not responsible for any damage done using this tool. This tool should only be used for educational purposes and for penetration testing.
Compatibility:
- Windows , Linux or any device running python 2.7
- Python 2.7
- Wordlist included(wordlist.txt)
- Modules required: Colorama, Mechanize
Modules Required:
- Colorama: https://pypi.python.org/pypi/colorama/
- Mechanize: https://pypi.python.org/pypi/mechanize/
Description:
BruteXSS is a very powerful and fast Cross-Site Scripting Brutforcer which is used for bruteforcing a parameters. The BruteXSS injects multiple payloads loaded from a specified wordlist and fires them at the specified parameters and scans if any of the parameter is vulnerable to XSS vulnerability. BruteXSS is very accurate at doing its task and there is no chance of false positive as the scanning is much powerful. BruteXSS supports POST and GET requests which makes it compatible with the modern web applications.
Features:
- XSS Bruteforcing
- XSS Scanning
- Supports GET/POST requests
- Custom wordlist can be included
- User-friendly UI
COMMAND: python brutexss.py
METHOD: g
URL: http://www.site.com/?parameter=value
WORDLIST: wordlist.txt
Usage(POST method):
COMMAND: python brutexss.py
METHOD: p
URL: http://www.site.com/file.php
POST DATA: parameter=value¶meter1=value1
WORDLIST: wordlist.txt
Output:
No hay comentarios:
Publicar un comentario