View Issue Details

IDProjectCategoryView StatusLast Update
0001413Kali LinuxNew Tool Requestspublic2020-02-10 18:14
Reportersaberzaid Assigned To 
PrioritynormalSeverityfeatureReproducibilityhave not tried
Status closedResolutionwon't fix 
Summary0001413: XSSYA - Cross Site Scripting Scanner & Vulnerability Confirmation
Description

XSSYA work by execute the payload encoded to bypass Web Application Firewall which is the first method request and response if it respond 200 it turn to Method 2 which search that payload decoded in web page HTML code if it confirmed get the last step which is execute document.cookie to get the cookie

XSSYA Features

  • Support HTTPS
    • After Confirmation (execute payload to get cookies)
    • Can be run in (Windows - Linux)
    • Identify 3 types of WAF (Mod_Security - WebKnight - F5 BIG IP)
      *XSSYA Continue Library of Encoded Payloads To Bypass WAF (Web Application Firewall)
    • Support Saving The Web HTML Code Before Executing
      the Payload Viewing the Web HTML Code into the Screen or Terminal

download:

https://github.com/yehia-mamdouh/XSSYA

Activities

g0tmi1k

g0tmi1k

2018-01-29 15:19

administrator   ~0008506

To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

  • [Name] - The name of the tool
  • [Version] - What version of the tool should be added?
    --- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
  • [Homepage] - Where can the tool be found online? Where to go to get more information?
  • [Download] - Where to go to get the tool?
  • [Author] - Who made the tool?
  • [Licence] - How is the software distributed? What conditions does it come with?
  • [Description] - What is the tool about? What does it do?
  • [Dependencies] - What is needed for the tool to work?
  • [Similar tools] - What other tools are out there?
  • [How to install] - How do you compile it?
  • [How to use] - What are some basic commands/functions to demonstrate it?
g0tmi1k

g0tmi1k

2020-02-10 18:14

administrator   ~0012194

This is python 2 - which is EOL

Issue History

Date Modified Username Field Change
2014-06-12 22:32 saberzaid New Issue
2014-06-29 19:52 vichet Issue cloned: 0001469
2018-01-29 15:19 g0tmi1k Note Added: 0008506
2019-12-09 13:30 g0tmi1k Severity minor => feature
2020-02-10 18:14 g0tmi1k Note Added: 0012194
2020-02-10 18:14 g0tmi1k Status new => closed
2020-02-10 18:14 g0tmi1k Resolution open => won't fix