mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-23 08:58:22 +00:00
change xss_attack.py NEW(design)
This commit is contained in:
parent
6bd1d96763
commit
19f22ecc04
1 changed files with 72 additions and 25 deletions
|
|
@ -1,13 +1,19 @@
|
|||
# coding=utf-8
|
||||
import os
|
||||
import subprocess
|
||||
from rich.console import Console
|
||||
from rich.panel import Panel
|
||||
from rich.prompt import Prompt
|
||||
from rich.table import Table
|
||||
|
||||
from core import HackingTool
|
||||
from core import HackingToolsCollection
|
||||
|
||||
console = Console()
|
||||
|
||||
|
||||
class Dalfox(HackingTool):
|
||||
TITLE = "DalFox(Finder of XSS)"
|
||||
TITLE = "DalFox (Finder of XSS)"
|
||||
DESCRIPTION = "XSS Scanning and Parameter Analysis tool."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo apt-get install golang",
|
||||
|
|
@ -23,7 +29,7 @@ class Dalfox(HackingTool):
|
|||
|
||||
class XSSPayloadGenerator(HackingTool):
|
||||
TITLE = "XSS Payload Generator"
|
||||
DESCRIPTION = "XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER"
|
||||
DESCRIPTION = "XSS PAYLOAD GENERATOR - XSS SCANNER - XSS DORK FINDER"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/capture0x/XSS-LOADER.git",
|
||||
"cd XSS-LOADER;sudo pip3 install -r requirements.txt"
|
||||
|
|
@ -40,25 +46,28 @@ class XSSFinder(HackingTool):
|
|||
PROJECT_URL = "https://github.com/Damian89/extended-xss-search"
|
||||
|
||||
def after_install(self):
|
||||
print("""\033[96m
|
||||
Follow This Steps After Installation:-
|
||||
\033[31m [*] Go To extended-xss-search directory,
|
||||
and Rename the example.app-settings.conf to app-settings.conf
|
||||
""")
|
||||
console.print(Panel.fit(
|
||||
"[bold cyan]Follow These Steps After Installation:[/bold cyan]\n"
|
||||
"[red]*[/red] Go to [yellow]extended-xss-search[/yellow] directory\n"
|
||||
"[green]*[/green] Rename [bold]example.app-settings.conf[/bold] → [bold]app-settings.conf[/bold]",
|
||||
title="[ Install Notes ]",
|
||||
border_style="magenta"
|
||||
))
|
||||
input("Press ENTER to continue")
|
||||
|
||||
def run(self):
|
||||
print("""\033[96m
|
||||
You have To Add Links to scan
|
||||
\033[31m[!] Go to extended-xss-search
|
||||
[*] config/urls-to-test.txt
|
||||
[!] python3 extended-xss-search.py
|
||||
""")
|
||||
console.print(Panel.fit(
|
||||
"[bold cyan]You need to add links to scan[/bold cyan]\n"
|
||||
"[red]*[/red] Go to [yellow]extended-xss-search/config/urls-to-test.txt[/yellow]\n"
|
||||
"[green]*[/green] Run: [bold]python3 extended-xss-search.py[/bold]",
|
||||
title="[ Run Instructions ]",
|
||||
border_style="blue"
|
||||
))
|
||||
|
||||
|
||||
class XSSFreak(HackingTool):
|
||||
TITLE = "XSS-Freak"
|
||||
DESCRIPTION = "XSS-Freak is an XSS scanner fully written in python3 from scratch"
|
||||
DESCRIPTION = "An XSS scanner fully written in Python 3 from scratch."
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/PR0PH3CY33/XSS-Freak.git",
|
||||
"cd XSS-Freak;sudo pip3 install -r requirements.txt"
|
||||
|
|
@ -69,7 +78,7 @@ class XSSFreak(HackingTool):
|
|||
|
||||
class XSpear(HackingTool):
|
||||
TITLE = "XSpear"
|
||||
DESCRIPTION = "XSpear is XSS Scanner on ruby gems"
|
||||
DESCRIPTION = "XSpear is an XSS Scanner built on Ruby Gems."
|
||||
INSTALL_COMMANDS = ["gem install XSpear"]
|
||||
RUN_COMMANDS = ["XSpear -h"]
|
||||
PROJECT_URL = "https://github.com/hahwul/XSpear"
|
||||
|
|
@ -84,27 +93,32 @@ class XSSCon(HackingTool):
|
|||
PROJECT_URL = "https://github.com/menkrep1337/XSSCon"
|
||||
|
||||
def run(self):
|
||||
website = input("Enter Website >> ")
|
||||
console.print(Panel.fit(
|
||||
"Enter target website to scan with XSSCon:",
|
||||
title="[bold yellow]XSSCon[/bold yellow]",
|
||||
border_style="bright_yellow"
|
||||
))
|
||||
website = Prompt.ask("[bold cyan]Enter Website[/bold cyan]")
|
||||
os.system("cd XSSCon;")
|
||||
subprocess.run(["python3", "xsscon.py", "-u", website])
|
||||
|
||||
|
||||
class XanXSS(HackingTool):
|
||||
TITLE = "XanXSS"
|
||||
DESCRIPTION = "XanXSS is a reflected XSS searching tool\n " \
|
||||
"that creates payloads based from templates"
|
||||
DESCRIPTION = "Reflected XSS searching tool that creates payloads from templates."
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/Ekultek/XanXSS.git"]
|
||||
PROJECT_URL = "https://github.com/Ekultek/XanXSS"
|
||||
|
||||
def run(self):
|
||||
os.system("cd XanXSS ;python xanxss.py -h")
|
||||
print("\033[96m You Have to run it manually By Using\n"
|
||||
" [!]python xanxss.py [Options]")
|
||||
os.system("cd XanXSS; python xanxss.py -h")
|
||||
console.print(
|
||||
"[cyan]You have to run it manually using:[/cyan]\n[bold yellow]python xanxss.py [options][/bold yellow]"
|
||||
)
|
||||
|
||||
|
||||
class XSSStrike(HackingTool):
|
||||
TITLE = "Advanced XSS Detection Suite"
|
||||
DESCRIPTION = "XSStrike is a python script designed to detect and exploit XSS vulnerabilities."
|
||||
DESCRIPTION = "XSStrike is a Python-based tool designed to detect and exploit XSS vulnerabilities."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo rm -rf XSStrike",
|
||||
"git clone https://github.com/UltimateHackers/XSStrike.git "
|
||||
|
|
@ -113,13 +127,12 @@ class XSSStrike(HackingTool):
|
|||
PROJECT_URL = "https://github.com/UltimateHackers/XSStrike"
|
||||
|
||||
def __init__(self):
|
||||
super(XSSStrike, self).__init__(runnable = False)
|
||||
super(XSSStrike, self).__init__(runnable=False)
|
||||
|
||||
|
||||
class RVuln(HackingTool):
|
||||
TITLE = "RVuln"
|
||||
DESCRIPTION = "RVuln is multi-threaded and Automated Web Vulnerability " \
|
||||
"Scanner written in Rust"
|
||||
DESCRIPTION = "Multi-threaded and Automated Web Vulnerability Scanner written in Rust."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/iinc0gnit0/RVuln.git;"
|
||||
"curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;"
|
||||
|
|
@ -144,3 +157,37 @@ class XSSAttackTools(HackingToolsCollection):
|
|||
XSSStrike(),
|
||||
RVuln()
|
||||
]
|
||||
|
||||
def show_info(self):
|
||||
console.print(Panel.fit(
|
||||
"[bold magenta]XSS Attack Tools Collection[/bold magenta]\n"
|
||||
"A curated set of tools for XSS vulnerability analysis and exploitation.",
|
||||
border_style="bright_magenta"
|
||||
))
|
||||
|
||||
def show_options(self, parent=None):
|
||||
console.print("\n")
|
||||
self.show_info()
|
||||
|
||||
table = Table(title="[bold cyan]Available Tools[/bold cyan]", show_lines=True)
|
||||
table.add_column("Index", justify="center", style="bold yellow")
|
||||
table.add_column("Tool Name", justify="left", style="bold green")
|
||||
table.add_column("Description", justify="left", style="white")
|
||||
|
||||
for i, tool in enumerate(self.TOOLS):
|
||||
table.add_row(str(i + 1), tool.TITLE, tool.DESCRIPTION or "—")
|
||||
|
||||
table.add_row("[red]99[/red]", "[bold red]Exit[/bold red]", "Return to Main Menu")
|
||||
|
||||
console.print(table)
|
||||
|
||||
try:
|
||||
choice = Prompt.ask("[bold cyan]Select a tool to run[/bold cyan]")
|
||||
choice = int(choice)
|
||||
if 1 <= choice <= len(self.TOOLS):
|
||||
self.TOOLS[choice - 1].show_options(parent=self)
|
||||
elif choice == 99:
|
||||
return 99
|
||||
except Exception:
|
||||
console.print("[bold red]Invalid choice. Try again.[/bold red]")
|
||||
return self.show_options(parent=parent)
|
||||
|
|
|
|||
Loading…
Reference in a new issue