Open reevesy1 opened 2 months ago
It helps if you add the URL in a string like this:
python3 xsstrike.py -u "http://10.6.6.100/vulnerabilities/xss_r/?name=test"
Ive had way more success with this when enclosing the URL in quotes than if I didn't do it.
even if it does find something, it just parses out some nonsense payloads with maximum confidence, like: [+] Payload: <hTmL/+/ONPointEreNTEr%0a=%0aconfirm()%0dx// [!] Efficiency: 92 [!] Confidence: 10 and they never work.
I'm assuming this tool isn't maintained anymore or decided to target some other vuln other than XSS, which would make the its name kind of unfortunate. That or somethings gone wrong with mine as it couldn't find water if it fell out of a boat. I even gave it the link to vulnerable DVWA page that i even left a working payload in it and it still can't find an XSS. Surely i'm doing something wrong here.
python3 xsstrike.py -u http://10.6.6.100/vulnerabilities/xss_r/?name=