XanXSS is a reflected XSS searching tool (DOM coming soon) that creates payloads based from templates. Unlike other XSS scanners that but run through a listing of payloads. XanXSS tries to brand the payload unidentifiable, for example:
With XanXSS every payload is different. XanXSS plant past times running through the payloads until a specified reveal is establish or a timer hits the max time, this prevents it from looping for to long. Some of the features included inwards XanXSS:
Options XanXSS comes consummate amongst the mightiness to role a proxy, is compatible amongst proxychains, in addition to allows yous to add together custom headers. I cause got provided a total listing of options for your convience:
usage: xanxss.py [-h] [-u http://test.com/test.php?id=] [-a VERIFY] [-f AMOUNT] [-t TIME] [-p SCRIPT, [SCRIPT, ...]] [-F FILE-PATH] [-v] [--proxy TYPE://IP:PORT] [-H HEADER=VALUE,HEADER:VALUE] [--throttle TIME secs] [-P] optional arguments: -h, --help exhibit this assist message in addition to transcend -u http://test.com/test.php?id=, --url http://test.com/test.php?id= transcend a URL to essay out for XSS vulnerabilities. it is recommended that yous role a URL amongst a enquiry parameter -a VERIFY, --amount VERIFY how many verifications steps to travel taken, this volition decide how reliable the payload is. the to a greater extent than verification steps the to a greater extent than reliable the payload volition travel (*default=5) -f AMOUNT, --find AMOUNT a ttempt to detect this amount of working payloads, specifying this does non guarantee yous volition detect this amount of working payloads (*default=25) -t TIME, --time TIME amount of fourth dimension inwards seconds to pass on testing, this volition travel used every bit a timer for the verification (*default=35s) -p SCRIPT, [SCRIPT, ...], --payloads SCRIPT, [SCRIPT, ...] transcend a comma separated listing of your ain payloads, must comprise at to the lowest degree v payloads -F FILE-PATH, --file FILE-PATH transcend a textual file containing payloads i per line, must comprise at to the lowest degree v payloads -v, --verbose run inwards verbose agency in addition to display to a greater extent than output (*default=False) --proxy TYPE://IP:PORT transcend a proxy inwards the format type://ip:port -H HEADER=VALUE,HEADER:VALUE, --headers HEADER=VALUE,HEADER:VALUE add together your ain custom headers to the asking (*default=connection,user-agent) --throttle TIME (secs) bound each asking amongst a slumber fourth dimension (*default=0) -P, --polyglot generate a polyglot script to append to the halt of the running scripts, if at that spot is XSS this should detect it (*default=False)