Skip to content

由于要做毕业设计,需对本程序进行调整,暂时取消开源。之后,本项目会与崭新的面貌,更好的功能与世界见面!This Project can give you a hand if you want to discover stored XSS in your Web Application.

Notifications You must be signed in to change notification settings

chiruom/Stored-XSS-Fuzzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Stored XSS Fuzzer

Beta 1

Written by 秋风落木 A Secondary Element Specie in China

======================== http://liyawei.cn [email protected] https://github.com/chiruom/

======================== Introduction

This tool can give you a hand if you want to discover stored XSS in your Web Application.

However,This tool is a beta edition now, So some bugs may be found when use it,You can edit the python code by yourself or connect author by [email protected] as well as in Github.com . Thanks for your support , if you can give me useful advice,I will very happy! Theory

This tool include a proxy to record the input and output points of user`s data when you browse your Web Application,and After your browsing,This tool will Resend the HTTP Request of the input point and output point many times,as the same time cheak the output ponits.The Tool will classify the Output points based the specific location (html,JavaScript,Css,eg)of data too.This process is a Fuzzing Test .

======================== Usega

  1. Open the Record.py .Set your browser proxy to 127.0.0.1:8083(you can change this in Record.py )
  2. Browse your Web Application as far as your can,Input the string

in every input points.Becaues the tool is base on the resending HTTP request , You should pay attention to do operation which can be Resent as you can .(For example,If your Web Application has a

“Blog” function,You should Use “Edit Blog” input the string

install of “White New Blog”function)

  1. You can see input point HTTP Request in Srcreq.txt after run Srcreq.py .

Same method,you can do it uder idct ./_Record/ to see output point

HPPT request.

  1. After your browsing , Close Record.py and run Test.py .wait some miniters,The Report will be wrote in Repot.html .
  2. Use Clear.py toclear the record and trace.

======================== Expansion

All the XSS Fuzz Vectors are in dict ./_XSS/ ,XSS Vectors are classifide in *.txt

by the specific location of output point.

File Location of output point

xss_ html Between html label, out of <>

xss_ in_html In html label,html attribute eg.

xss_ html_js In javascript which is inset in

html code

xss_ js In Script label of *.js file

xss_ css In css

xss_ json Transmited in json

You can edit those txt files by your means.

About

由于要做毕业设计,需对本程序进行调整,暂时取消开源。之后,本项目会与崭新的面貌,更好的功能与世界见面!This Project can give you a hand if you want to discover stored XSS in your Web Application.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published