Jump to content
Fi8sVrs

XSSYA Cross Site Scripting Scanner

Recommended Posts

  • Active Members

XSSYA is a Cross Site Scripting Scanner & Vulnerability Confirmation (Working in two Methods)

• Method number 1 for Confirmation Request and Response

• Method number 2 for Confirmation Execute encoded payload and search for the same payload in web HTML code but decoded

• Support HTTPS

• After Confirmation (execute payload to get cookies)

• Identify 3 Types of WAF (Mod_Security - WebKnight - F5 BIG IP)

• Can be run in (Windows - Linux)

XSSYA Continue Library of Encoded Payloads To Bypass WAF (Web Application Firewall)

It Also Support Saving the Web Html Code Before Executing the Payload Viewing the Web HTML Code into the Screen or Terminal

$ Python xssya.py

Links should end with (/or=or?)

Example

$ Python xssya.py

http://www.domain.com/ http://www.domain.com= http://www.domain.com?

The only Module need to download is colorama-0.2.7 https://pypi.python.org/pypi/colorama

Note: Crawling (need to be enhanced)

Download:

Download: XSSYA Cross Site Scripting Scanner ? Packet Storm

Author:

Yehiamamdouh51@hotmail.com

secure-edf provide tools for web application articles & videos check xssya xss - cross site scripting scanner and vulnerability confiramtion

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...