-
Hello ... anyone can help me with this error
Traceback (most recent call last):
File "/home/kali/Downloads/Xss/loxs/tool/xss.py", line 242, in
run_xss_scanner()
File "/home/kali/Downloa…
-
### Is your feature request related to a problem? Please describe.
your XSS scanner doesn't detect the Vulnerability in HTML attrname or value ,because it doesn't parse the location of the payload , …
-
┌──────────────────────────────────────────────────────────────────────────────────┐
│ → Scanning URL: https://blog.glia.com/category/technology/page/3/?filter_by=FUZZ │
└─────────────────────────…
-
**Describe the bug**
I was wondering if the expected issues provided (scanner/sast/expectedIssues.csv) within the repo is current. If not, is there a separate repo or file that contain an updated ver…
-
### Output of suspected false positive / negative
Post any useful information like the ID of the test causing the false positive.
### Debug output
Run:
```
./nikto.pl -host targethost -Save false_…
-
looks like your domain got pwnd or something because going to the link in the git readme trys to launch malware from my browser.
-
Hey! thanks for the update guys 🙂
I just edited the script for my payloads to not be encoded from xss.txt but it still fails to detect when it's vulnerable...
-
```
What steps will reproduce one of the problems?
A.persistent XSS via urlToScan parameter of scanner.php
screenshot 'persistent XSS_1.jpg' attacked
1. attempt to scan http://test123.com/alert(1)…
-
```
What steps will reproduce one of the problems?
A.persistent XSS via urlToScan parameter of scanner.php
screenshot 'persistent XSS_1.jpg' attacked
1. attempt to scan http://test123.com/alert(1)…
-
```
What steps will reproduce one of the problems?
A.persistent XSS via urlToScan parameter of scanner.php
screenshot 'persistent XSS_1.jpg' attacked
1. attempt to scan http://test123.com/alert(1)…