XssPy is a python tool for finding Cross Site Scripting vulnerabilities in websites. This tool is the first of its kind. Instead of just checking one page as most of the tools do, this tool traverses the website and find all the links and subdomains first. After that, it starts scanning each and every input on each and every page that it found while its traversal. It uses small yet effective payloads to search for XSS vulnerabilities.
The tool has been tested parallel with paid Vulnerability Scanners and most of the scanners failed to detect the vulnerabilities that the tool was able to find. Moreover, most paid tools scan only one site whereas XSSPY first finds a lot of subdomains and then scan all the links altogether. The tool comes with:
- Short Scanning
- Comprehensive Scanning
- Finding subdomains
- Checking every input on every page
With this tool, Cross Site Scripting vulnerabilities have been found in the websites of MIT, Stanford, Duke University, Informatica, Formassembly, ActiveCompaign, Volcanicpixels, Oxford, Motorola, Berkeley and many more.
How to Use:
- Go to the directory where you have xsspy.py
- Type python xsspy.py website.com (Type the website name without “www”)
- The scanner will start scanning and will output many urls which it is testing at the moment.
- If it outputs “Xss found and the link is .. “, then you have found a XSS vulnerability. Otherwise, it is just checking the links one by one.
- After you have found the vulnerability. You can try the following payloads to exploit it and have an alert box. You can then report it and get rewards. (http://pastebin.com/J1hCfL9J)
Note: If you face any problem, comment below.