XSSer
XSSer is an automatic framework to detect, exploit, and report XSS vulnerabilities in web-based applications. It includes options to bypass filters and uses various code injection techniques.
Description
Cross Site "Scripter" (XSSer) is a comprehensive testing framework designed for identifying and exploiting Cross-Site Scripting (XSS) vulnerabilities. It automates the process of scanning web applications by injecting payloads into parameters and analyzing responses for successful exploitation. The tool supports multiple input methods including URLs, files, search dorks, and crawling, making it versatile for both targeted and broad assessments.
Use cases include penetration testing of web applications to uncover reflected, stored, and DOM-based XSS flaws. Security researchers and pentesters can leverage XSSer to bypass common Web Application Firewalls (WAFs), IDS systems, and anti-XSS filters through specialized bypassers and encoding techniques. It also facilitates advanced reporting and payload customization for real-world exploitation scenarios.
The framework provides special features like generating XSS payloads in images, Flash movies, and testing for Cross-Site Tracing (XST). This positions XSSer as a powerful tool in offensive security toolkits, particularly for web vulnerability analysis.
How It Works
XSSer operates by selecting targets via URLs, files, dorks, or crawling, then injecting XSS vectors into GET, POST, or crawled parameters marked with 'XSS'. It sends customized HTTP requests with spoofed headers, cookies, and IPs, employing checkers like hash, heuristic, and reverse connections to detect filtering. Vectors from an internal list (default 1293) or custom payloads are encoded using bypassers (e.g., hexadecimal, String.fromCharCode) and techniques (e.g., DOM, cookie injection) to evade defenses. Positive detections trigger final injections for exploitation, with results reported in raw or XML formats.
Installation
sudo apt install xsserFlags
Examples
xsser --gtkxsser -u http://example.com -g id=XSSxsser --all http://example.comxsser -i targets.txt -p user=XSSxsser -d "news.php?id=" --Daxsser -u http://example.com --c 100 --auto --savexsser --xst https://host.comxsser -u http://example.com --Hex --Dom --Fp="<script>alert(1)</script>"