XSStrike Wiki • Usage • FAQ • Compatibility • Gallery
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.
Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work with context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:
}]};(confirm)()//\
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//
Apart from that, XSStrike has crawling, fuzzing, parameter discovery, WAF detection capabilities as well. It also scans for DOM XSS vulnerabilities.
- Reflected and DOM XSS Scanning
- Multi-threaded crawling
- Context analysis
- Configurable Core
- Highly Researched Work-flow
- WAF detection & evasion
- Handmade HTML & JavaScript parser
- Powerful fuzzing engine
- Intelligent payload generator
- Complete HTTP Support
- Powered by Photon, Zetanize and Arjun
Note: This is a beta release and hence prone to bugs. If you find a bug please create an issue.
- Why XSStrike boasts that it is the most advanced XSS detection suite?
- How does XSStrike decide if the injection was successful without a browser engine?
- Does that mean it doesn't have false negatives or false positives?
- Tool xyz works against the target, while XSStrike doesn't!
- Can I copy it's code?
- But I will give you credits, is that okay?
- What if I want to embed it into a proprietary software?
Hidden Parameter Discovery
XSStrike v3.0 is in beta phase at present and has been released for public testing.
Useful issues and pull requests are appreciated.
I haven't decided a license yet.