XSSight/README.md
2017-03-27 20:05:43 +05:30

1.6 KiB

XSSight

It is script that can scan for XSS vulnerabilites and inject payloads. Example: .-'^\ /^'-. .' \ / . / /.---. .---.\ | // '-. ___________________________ .-' \ | | ;| /--------------------------// |; | \ || |_) XSSight (/| || / \ | \ . \ ; | By Team Ultimate || ; / . / | / '_\ \ \ \ \ | ||/ / / // //' \ \ \ | Beta Release |/ / / // '-\_\_\ teamultimate.in /_/_/-' '--------------------------' These types of URLs are accepted Example: http://www.dwebsite.com/ Example: http://www.website.com= Example: http://www.website.com?

Enter target url: http://dramaonline.pk/search.php?q=

Select an operation:

  1. XSS Scanner
  2. Payload Injector Enter your choice [1-2] : 1 Date: Mon, 27 Mar 2017 14:35:00 GMT Server: Apache/2.2.3 (CentOS) Cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Set-Cookie: PHPSESSID=b7amfe25hf7eradfobmh6q39a3; path=/ Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Vary: Accept-Encoding,User-Agent Connection: close Content-Type: text/html; charset=UTF-8
  • scanning GET parameter 'q' (i) GET parameter 'q' appears to be XSS vulnerable ("", enclosed by