• Stars
    star
    327
  • Rank 128,686 (Top 3 %)
  • Language
    Shell
  • License
    MIT License
  • Created over 4 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities

XRCross (Recon)

Details

About XRCross

XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. 
This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities 

✔️ Options:

    Example: 
            XRCross -u/--url example.site <arguments>
            
    
    Optional Arguments:
            -h /--help          | show this help message and exit
            -u /--url           | URLs
            -a /--aws           | Amazon S3 bucket enumeration
            -p /--proxy         | URL of the proxy server (default: http://127.0.0.1:8080)
            -s /--subdo         | Check Subdomains Enumerations
            -m /--map           | Domain Mapping with dnsdumster
            -l /--live          | Check live the Subdomains for working HTTP and HTTPS servers
            -hr/--header        | Host header injection 
            -sm/--smuggling     | HTTP request smuggling 
            -t /--takeover      | Check Posible Takeover
            -cr/--cors          | CORS misconfiguration scanner
                --flash         | Basic cors misconfig flash
            -d /--dir           | Dir enumeration
               -w /--wordlists  | Wordlist file to use for enumeration. (default wordlists/wordlists.txt)
            -lp/--lfiparam      | Get LFI Parameters       
                --lfiv          | LFI Check Vulnerabilty
            -st/--ssti          | Get parameter SSTI Vulnerabilty  
                --sstiv         | Test Vulnerabilty SSTI
            -ss/--ssrf          | Get SSRF Parameters 
                --blind         | Blind SSRF testing Vulnerabilty
            -c /--cmd           | Get Command Injection Parameter
                --cmdv          | Command Injection Check Vulnerabilty
            -r /--redirect      | Get redirec Parameters
                --rev           | Get Vulnerabilty Open-redirect
            -x /--xss           | Get XSS Parameters        
                --xssv          | XSS Scanners Vulnerabilty
            -j /--jstatus       | Get Status JavaScript 
                --jsurl         | Gathering all js urls and extract endpoints from js file

            -pr/--param         
                --idor          | Get IDOR Parameters
                --rce           | Get RCE Parameters
                --sqli          | Get SQLI Parameters
                --img           | Get img-traversal Parameters
                --int           | Interestingparams

            -w /--wayback       | Scraping wayback for data
                --js            | Jsurls 
                --php           | Phpurls
                --asp           | ASP
                --html          | Html
            -v /--verbose       | verbose mode
            -o /--outfile       | outfile    

✔️ How to install XRCross:

root@kali~# git clone https://github.com/pikpikcu/xrcross.git

root@kali~# ./install.sh

root@kali~# ./XRCross -h

Open folder config/ and edit file:
  |-> Api-github.txt <(inssert github token)
  |-> ssrf.txt <(inssert ssrf payload)
  |-> xss.ht <(inssert your.xss.ht)

✔️ Go language dependency:

All the dependent libraries are compiled with go version 1.14.2. So go version 1.14.2 should be installed
(strictly). Secondly, $GOPATH should be set to /root/go and it should be exported to PATH using "export PATH=$PATH:$GOROOT/bin/:$GOPATH/bin" 
and same should be present in profile or bash_profile or bashrc. XRCross checks for all the go dependencies under ~/go/bin.

✔️ Donate!

(I love coffee and am very addicted to coffee:v)
Buy Me A Coffee

✔️ Contribution & License

You can contribute in following ways:

  • Give suggestions to make it better
  • Fix issues & submit a pull request

Credits Thanks:

More Repositories

1

Pentest-Tools-Framework

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Python
419
star
2

nodesub

Nodesub is a command-line tool for finding subdomains in bug bounty programs
JavaScript
136
star
3

nuubi

Nuubi Tools (Information-ghatering|Scanner|Recon.)
Python
86
star
4

js-finding

JS Finding can be used to extract JavaScript (JS) files from either a single domain URL or a list of domains. The tool supports various extraction methods and provides additional options for file download and wordlists creation.
Python
39
star
5

mtk-su

mtk-su
25
star
6

nuclei-fuzz

18
star
7

hostinject

hostinject (Host Header Injection) Tool is a Python script that allows you to perform host header injection vulnerability testing on a target URL or a list of URLs. It injects various header values and checks for potential vulnerabilities.
Python
16
star
8

subdomain-monitoring-elasticsearch

Go
15
star
9

nodecraw

nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract information, and save the results.
JavaScript
12
star
10

naomi

Naomi is a simple OSINT and information gathering tool that can scan quickly.
Python
10
star
11

bash-recon

[+] bash recon
Shell
7
star
12

kurosploit

KuroSploit is an exploit tool, KuroSploit provides an easy way to create backdoors and payload.
Python
7
star
13

ResIm

ResIm is designed as a bash tool to find out domains,subdomains,ip subdomains, ports, DNS
Shell
5
star
14

EsubIz

EsubIz Tools,Passive subdomain Enumeration
Shell
5
star
15

crlfi

Go
4
star
16

my-nuclei-templates

3
star
17

ip2host

This tool performs TLS connections to specified IP addresses, retrieves host information, and optionally gathers detailed IP information using the ipapi.co API.
Go
2
star
18

bug-actions

2
star
19

dotfile

Vim Script
2
star
20

tlds

Go
2
star