From ff45654eb964896c915b8b85ae5947899f620172 Mon Sep 17 00:00:00 2001 From: UltimateHackers Date: Mon, 27 Mar 2017 20:05:43 +0530 Subject: [PATCH] Update README.md --- README.md | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/README.md b/README.md index 764b78f..3f02db6 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,38 @@ # XSSight It is script that can scan for XSS vulnerabilites and inject payloads. +Example: + .-'^`\ /`^'-. + .' ___\ /___ `. + / /.---. .---.\ ` + | // '-. ___________________________ .-' \ | + | ;| \/--------------------------// |; | + \ || |\_) XSSight (_/| || / + \ | \ . \ ; | By Team Ultimate || ; / . / | / + '\_\ \ \ \ \ | ||/ / / // /_/' + \ \ \ \| Beta Release |/ / / // + `'-\_\_\ teamultimate.in /_/_/-'` + '--------------------------' + These types of URLs are accepted + Example: http://www.dwebsite.com/ + Example: http://www.website.com= + Example: http://www.website.com? + + Enter target url: http://dramaonline.pk/search.php?q= +------------------------------ +Select an operation: +------------------------------ + 1. XSS Scanner + 2. Payload Injector + Enter your choice [1-2] : 1 +Date: Mon, 27 Mar 2017 14:35:00 GMT +Server: Apache/2.2.3 (CentOS) +Cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 +Set-Cookie: PHPSESSID=b7amfe25hf7eradfobmh6q39a3; path=/ +Expires: Thu, 19 Nov 1981 08:52:00 GMT +Pragma: no-cache +Vary: Accept-Encoding,User-Agent +Connection: close +Content-Type: text/html; charset=UTF-8 + +* scanning GET parameter 'q' + (i) GET parameter 'q' appears to be XSS vulnerable ("", enclosed by