How To Use XSStrike?


Installation
   XSStrike is a python script so you don't need to install it and it will run on any platform which has python2.7 and all required modules installed.

   You can download XSStrike from its Github Repo.

Using XSStrike
   This is the user interface of XSStrike


   Now lets start by entering a URL with parameters. For example: 
   target.com/search.php?q=d3v&type=search

   Do you see the highlighted word "d3v"? Well it is used to tell XSStrike that this is parameter I want to focus on. Don't worry if you want to test all the paramteres because Striker will handle that. XSStrike both GET and POST methods.

   For now lets supply a URL which uses GET Method.


   You will see a menu like this after you enter the target.

   So whats up with these weird names? Lets start with the first line which says [+] WAF Status : Offline

   Well its a feature of XSStrike, it checks if there's a WAF active on the target. It also has ability to detect WAF


MAIN FEATURES
  Fuzzer
    Fuzzer checks where and how many time the input is getting reflected. It automatically detects in which context the input is getting reflected, then it tries to break out of the contexts one by one and suggests payloads if successful.


   Striker
    Striker simply bruteforces XSS payloads into all the parameters one by one. Requests are delayed automatically if a WAF is active. All the payloads are carefully crafted by me for breaking common contexts and bypassing filters and WAFs.


   Spider
    Striker finds all the links present on the homepage of the target. After that, it finds all the HTML forms in those pages and  checks if they are vulnerable to XSS.



   Ninja
    Ninja can be used to check what is allowed/blocked by the filter/WAF. So basically you can say it reverse engineers the rules of filter/WAF. It also measures of the strength of the filter and suggests payloads on the basis of the rules of the filter. It gives a beutiful table as the output.


   Hulk
     It has a list of polyglots and solid payloads, it just enters them one by one in the target parameter and opens the resulted URL in a browser window.



Using POST method
    Testing a target which uses POST method is a piece of cake. Just enter the URL and POST data, as simple as that.


XSStrike Website