haroonawanofficial / XSSInspector-SecurityToolkit

XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identification and mitigation, serving as a valuable asset for security experts and developers.
3 stars 2 forks source link
bugs mitigation threat-hunting vulnerability vulnerability-detection vulnerability-scanners xss xss-attacks xss-detection xss-exploitation xss-vulnerability

XSSInspector

The XSSInspector is a powerful security tool designed to find Cross-Site Scripting (XSS) threats—a pervasive and dangerous issue in web applications. This open-source solution simplifies XSS vulnerability identification and mitigation, serving as a valuable asset for security experts and developers.

Features

  1. xss_vulnerabilities.db is an SQLite database used to store information about detected XSS vulnerabilities during the scanning process.
  2. Structured Storage: The database provides structured storage for vulnerabilities and their associated URLs.
  3. Persistence: Data stored in the database persists across multiple runs of the scanning tool, allowing for historical tracking of security findings.
  4. Ease of Querying: SQLite supports SQL queries, making it easy to retrieve and analyze stored data.
  5. Security Findings: Vulnerable URLs and related details are stored in the database, including the URL itself and other relevant information.
  6. Centralized Storage: All security findings are kept in one centralized location, facilitating efficient vulnerability management.
  7. Historical Data: The database accumulates historical data on detected vulnerabilities, enabling trend analysis and reporting over time.
  8. Reporting and Compliance: Structured data in the database aids in generating comprehensive reports and compliance documentation.

False Positive Reducation

  1. In an effort to reduce false positives when hunting for XSS vulnerabilities, this tool employs a False Positive Damping approach.
  2. It automatically sends a HEAD request to the URL and checks the Content-Type header of the response.
  3. The tool examines Content-Type header indicates that the URL points to a non-HTML or non-PHP file (e.g., images, non-web content), the tool bypasses the URL link.
  4. Parameter Analysis: For each URL, it analysis the query parameters to identify parameters that may be related to file handling. This includes parameters such as "file," "path," "image," "download," etc.
  5. Parameter Whitelisting: It creats whitelist parameters that are known to be safe and not associated with file handling.
  6. Filtering: Before testing a payload against a URL, it checks if any of the query parameters match the file-related keywords.

Heuristic & Obfuscation Structure and Logic:

Obfuscations with Bypassing (96 special modes are supported built-in)

Screenshots

Alt text

Alt text

Alt text

Alt text

Benchmark

Usage

  1. Clone the repository.
  2. Install the required dependencies.
  3. Specify the target domain or provide a list of URLs.
  4. Run the tool with the desired options.

Usage Example


python3 XSSInspector.py -t 50 --output vulnerable.txt -s --deepcrawl --report report_template.html -d testphp.vulnweb.com