World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect Reflected, Stored, DOM, and Blind (XSS) vulnerabilities in servers/apps at RFC design, forms, crawls, and through advanced AI techniques with deep and reinforcement learning, (NLP) and automatic payload generation.
Created and designed by Haroon Ahmad Awan.
Save the following content as requirements.txt
in the root directory of your project:
numpy
scipy
scikit-learn
pandas
tensorflow
keras
sqlalchemy
flask
beautifulsoup4
requests
lxml
python3 -m venv venv
source venv/bin/activate
venv\Scripts\activate
pip install -r requirements.txt
python xssscanadv.py
Includes built-in obfuscation methods to automatically check if we successfully bypassed the firewall. Results are then recorded into trained data, enhancing the detection and accuracy of payloads to identify more vulnerabilities.
Built-in HTTP verb tampering to check for vulnerabilities, using known and unknown HTTP verbs.
Utilizes neural networks to predict vulnerabilities based on complex features.
Trains models on past scan results and uses them to filter and prioritize URLs for scanning.
Analyzes web page content to identify forms and input fields that could be susceptible to XSS attacks.
Extracts details of forms and input fields to better target XSS injection points.
Learns from each scanning attempt to improve payload selection and application over time.
Adjusts future payload selection based on the success of past attempts.
Generates sophisticated XSS payloads dynamically based on the structure of the web page.
Provides tailored payloads for different server types (e.g., nginx, apache, IIS).
Fetches additional URLs using CommonCrawl and Wayback Machine to ensure comprehensive coverage.
Focuses on URLs likely to be vulnerable based on predictive models.
Detects blind XSS vulnerabilities and can use custom endpoints to detect real-time blind XSS, training the software for more accuracy in future scans. Types include:
Identifies reflected XSS vulnerabilities and their subtypes by analyzing the immediate reflection of payloads. Types include:
Detects stored XSS vulnerabilities by inspecting whether payloads are saved and executed later within the web application. Types include:
Logs all scan results in a SQLite database for easy access and analysis.
Go to https://inloop.github.io/sqlite-viewer/# and import the .db file to see what's going on after you have finished scanning with success and failure ratios(intended for expert users only)
Generates detailed HTML reports summarizing the scan results and vulnerabilities found.
Utilizes multi-threading to scan multiple URLs simultaneously, improving scanning speed and efficiency.
python xssscanadv.py -d http://testphp.vulnweb.com --crawl
python xssscanadv.py -d http://testphp.vulnweb.com --crawl --report report.html
python xssscanadv.py -l crawled_urls.txt -t 100 --duration 3600 -s --mode autounderstand --use-model --report report.html
python xssscanadv.py -d http://testphp.vulnweb.com --extractquick
python xssscanadv.py -l testphp_vulnweb_com_cleaned_urls.txt -t 100 --duration 3600 -s --mode autounderstand --use-model --report report.html
python xssscanadv.py -d domain testphp.vulnweb.com -l testphp_vulnweb_com_cleaned_urls.txt -t 100 --duration 3600 -s --mode autounderstand --use-model --report report.html
python xssscanadv.py -d http://testphp.vulnweb.com --deepcrawl --report myreport.html
python xssscanadv.py -l found_links.txt -t 100 --duration 3600 -s --mode autounderstand --use-model --report report.html