2020-08-14 11:11:59 +00:00
|
|
|
import os
|
|
|
|
|
import subprocess
|
2025-10-14 06:02:18 +00:00
|
|
|
from rich.panel import Panel
|
|
|
|
|
from rich.prompt import Prompt
|
2020-08-14 11:11:59 +00:00
|
|
|
|
2026-03-15 08:25:04 +00:00
|
|
|
from core import HackingTool, HackingToolsCollection, console
|
2025-10-14 06:02:18 +00:00
|
|
|
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
class Dalfox(HackingTool):
|
2025-10-14 06:02:18 +00:00
|
|
|
TITLE = "DalFox (Finder of XSS)"
|
2020-08-14 11:11:59 +00:00
|
|
|
DESCRIPTION = "XSS Scanning and Parameter Analysis tool."
|
|
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:25:05 +00:00
|
|
|
"sudo apt-get install -y golang",
|
|
|
|
|
"go install github.com/hahwul/dalfox/v2@latest",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = [
|
2026-03-15 08:25:05 +00:00
|
|
|
"~/go/bin/dalfox --help",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
|
|
|
|
PROJECT_URL = "https://github.com/hahwul/dalfox"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class XSSPayloadGenerator(HackingTool):
|
|
|
|
|
TITLE = "XSS Payload Generator"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = "XSS PAYLOAD GENERATOR - XSS SCANNER - XSS DORK FINDER"
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/capture0x/XSS-LOADER.git",
|
|
|
|
|
"cd XSS-LOADER;sudo pip3 install -r requirements.txt"
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd XSS-LOADER;sudo python3 payloader.py"]
|
|
|
|
|
PROJECT_URL = "https://github.com/capture0x/XSS-LOADER.git"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class XSSFinder(HackingTool):
|
|
|
|
|
TITLE = "Extended XSS Searcher and Finder"
|
|
|
|
|
DESCRIPTION = "Extended XSS Searcher and Finder"
|
|
|
|
|
INSTALL_COMMANDS = [
|
2020-12-14 17:29:44 +00:00
|
|
|
"git clone https://github.com/Damian89/extended-xss-search.git"]
|
2020-08-14 11:11:59 +00:00
|
|
|
PROJECT_URL = "https://github.com/Damian89/extended-xss-search"
|
|
|
|
|
|
|
|
|
|
def after_install(self):
|
2025-10-14 06:02:18 +00:00
|
|
|
console.print(Panel.fit(
|
|
|
|
|
"[bold cyan]Follow These Steps After Installation:[/bold cyan]\n"
|
|
|
|
|
"[red]*[/red] Go to [yellow]extended-xss-search[/yellow] directory\n"
|
|
|
|
|
"[green]*[/green] Rename [bold]example.app-settings.conf[/bold] → [bold]app-settings.conf[/bold]",
|
|
|
|
|
title="[ Install Notes ]",
|
|
|
|
|
border_style="magenta"
|
|
|
|
|
))
|
2020-08-14 11:11:59 +00:00
|
|
|
input("Press ENTER to continue")
|
|
|
|
|
|
|
|
|
|
def run(self):
|
2025-10-14 06:02:18 +00:00
|
|
|
console.print(Panel.fit(
|
|
|
|
|
"[bold cyan]You need to add links to scan[/bold cyan]\n"
|
|
|
|
|
"[red]*[/red] Go to [yellow]extended-xss-search/config/urls-to-test.txt[/yellow]\n"
|
|
|
|
|
"[green]*[/green] Run: [bold]python3 extended-xss-search.py[/bold]",
|
|
|
|
|
title="[ Run Instructions ]",
|
|
|
|
|
border_style="blue"
|
|
|
|
|
))
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class XSSFreak(HackingTool):
|
|
|
|
|
TITLE = "XSS-Freak"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = "An XSS scanner fully written in Python 3 from scratch."
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/PR0PH3CY33/XSS-Freak.git",
|
|
|
|
|
"cd XSS-Freak;sudo pip3 install -r requirements.txt"
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd XSS-Freak;sudo python3 XSS-Freak.py"]
|
|
|
|
|
PROJECT_URL = "https://github.com/PR0PH3CY33/XSS-Freak"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class XSpear(HackingTool):
|
|
|
|
|
TITLE = "XSpear"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = "XSpear is an XSS Scanner built on Ruby Gems."
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = ["gem install XSpear"]
|
|
|
|
|
RUN_COMMANDS = ["XSpear -h"]
|
|
|
|
|
PROJECT_URL = "https://github.com/hahwul/XSpear"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class XSSCon(HackingTool):
|
|
|
|
|
TITLE = "XSSCon"
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/menkrep1337/XSSCon.git",
|
|
|
|
|
"sudo chmod 755 -R XSSCon"
|
|
|
|
|
]
|
|
|
|
|
PROJECT_URL = "https://github.com/menkrep1337/XSSCon"
|
|
|
|
|
|
|
|
|
|
def run(self):
|
2025-10-14 06:02:18 +00:00
|
|
|
console.print(Panel.fit(
|
|
|
|
|
"Enter target website to scan with XSSCon:",
|
|
|
|
|
title="[bold yellow]XSSCon[/bold yellow]",
|
|
|
|
|
border_style="bright_yellow"
|
|
|
|
|
))
|
|
|
|
|
website = Prompt.ask("[bold cyan]Enter Website[/bold cyan]")
|
2026-03-15 08:25:05 +00:00
|
|
|
from config import get_tools_dir
|
|
|
|
|
subprocess.run(["python3", "xsscon.py", "-u", website],
|
|
|
|
|
cwd=str(get_tools_dir() / "XSSCon"))
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class XanXSS(HackingTool):
|
|
|
|
|
TITLE = "XanXSS"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = "Reflected XSS searching tool that creates payloads from templates."
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = ["git clone https://github.com/Ekultek/XanXSS.git"]
|
|
|
|
|
PROJECT_URL = "https://github.com/Ekultek/XanXSS"
|
|
|
|
|
|
|
|
|
|
def run(self):
|
2026-03-15 08:25:05 +00:00
|
|
|
from config import get_tools_dir
|
|
|
|
|
subprocess.run(["python3", "xanxss.py", "-h"],
|
|
|
|
|
cwd=str(get_tools_dir() / "XanXSS"))
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class XSSStrike(HackingTool):
|
|
|
|
|
TITLE = "Advanced XSS Detection Suite"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = "XSStrike is a Python-based tool designed to detect and exploit XSS vulnerabilities."
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"sudo rm -rf XSStrike",
|
|
|
|
|
"git clone https://github.com/UltimateHackers/XSStrike.git "
|
|
|
|
|
"&& cd XSStrike && pip install -r requirements.txt"
|
|
|
|
|
]
|
|
|
|
|
PROJECT_URL = "https://github.com/UltimateHackers/XSStrike"
|
|
|
|
|
|
|
|
|
|
def __init__(self):
|
2026-03-15 08:25:04 +00:00
|
|
|
super().__init__(runnable=False)
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class RVuln(HackingTool):
|
|
|
|
|
TITLE = "RVuln"
|
2026-03-15 08:30:55 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = "Multi-threaded and Automated Web Vulnerability Scanner written in Rust."
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:25:05 +00:00
|
|
|
"git clone https://github.com/iinc0gnit0/RVuln.git;"
|
2020-08-14 11:11:59 +00:00
|
|
|
"curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;"
|
2020-12-19 20:13:53 +00:00
|
|
|
"source $HOME/.cargo/env;"
|
|
|
|
|
"sudo apt install librust-openssl-dev;"
|
2020-12-19 20:15:56 +00:00
|
|
|
"cd RVuln;sudo su;cargo build --release;mv target/release/RVuln"
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["RVuln"]
|
|
|
|
|
PROJECT_URL = "https://github.com/iinc0gnit0/RVuln"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class XSSAttackTools(HackingToolsCollection):
|
|
|
|
|
TITLE = "XSS Attack Tools"
|
|
|
|
|
TOOLS = [
|
|
|
|
|
Dalfox(),
|
|
|
|
|
XSSPayloadGenerator(),
|
|
|
|
|
XSSFinder(),
|
|
|
|
|
XSSFreak(),
|
|
|
|
|
XSpear(),
|
|
|
|
|
XSSCon(),
|
|
|
|
|
XanXSS(),
|
|
|
|
|
XSSStrike(),
|
|
|
|
|
RVuln()
|
|
|
|
|
]
|
2025-10-14 06:02:18 +00:00
|
|
|
|
|
|
|
|
def show_info(self):
|
|
|
|
|
console.print(Panel.fit(
|
|
|
|
|
"[bold magenta]XSS Attack Tools Collection[/bold magenta]\n"
|
|
|
|
|
"A curated set of tools for XSS vulnerability analysis and exploitation.",
|
|
|
|
|
border_style="bright_magenta"
|
|
|
|
|
))
|