diff --git a/README.md b/README.md deleted file mode 100644 index 3f02db6..0000000 --- a/README.md +++ /dev/null @@ -1,38 +0,0 @@ -# XSSight -It is script that can scan for XSS vulnerabilites and inject payloads. -Example: - .-'^`\ /`^'-. - .' ___\ /___ `. - / /.---. .---.\ ` - | // '-. ___________________________ .-' \ | - | ;| \/--------------------------// |; | - \ || |\_) XSSight (_/| || / - \ | \ . \ ; | By Team Ultimate || ; / . / | / - '\_\ \ \ \ \ | ||/ / / // /_/' - \ \ \ \| Beta Release |/ / / // - `'-\_\_\ teamultimate.in /_/_/-'` - '--------------------------' - These types of URLs are accepted - Example: http://www.dwebsite.com/ - Example: http://www.website.com= - Example: http://www.website.com? - - Enter target url: http://dramaonline.pk/search.php?q= ------------------------------- -Select an operation: ------------------------------- - 1. XSS Scanner - 2. Payload Injector - Enter your choice [1-2] : 1 -Date: Mon, 27 Mar 2017 14:35:00 GMT -Server: Apache/2.2.3 (CentOS) -Cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 -Set-Cookie: PHPSESSID=b7amfe25hf7eradfobmh6q39a3; path=/ -Expires: Thu, 19 Nov 1981 08:52:00 GMT -Pragma: no-cache -Vary: Accept-Encoding,User-Agent -Connection: close -Content-Type: text/html; charset=UTF-8 - -* scanning GET parameter 'q' - (i) GET parameter 'q' appears to be XSS vulnerable ("", enclosed by