https://github.com/Sharpforce/XSS-Exploitation-Tool
An XSS Exploitation Tool
https://github.com/Sharpforce/XSS-Exploitation-Tool
cross-site-scripting xss xss-attacks
Last synced: 3 months ago
JSON representation
An XSS Exploitation Tool
- Host: GitHub
- URL: https://github.com/Sharpforce/XSS-Exploitation-Tool
- Owner: Sharpforce
- License: gpl-3.0
- Created: 2020-02-12T18:02:19.000Z (over 5 years ago)
- Default Branch: main
- Last Pushed: 2024-09-17T19:21:19.000Z (10 months ago)
- Last Synced: 2024-09-18T04:01:09.680Z (10 months ago)
- Topics: cross-site-scripting, xss, xss-attacks
- Language: JavaScript
- Homepage: https://sharpforce.gitbook.io/cybersecurity/mes-projets/xss-exploitation-tool
- Size: 10.3 MB
- Stars: 257
- Watchers: 7
- Forks: 51
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
Awesome Lists containing this project
- awesome-rainmana - Sharpforce/XSS-Exploitation-Tool - An XSS Exploitation Tool (PHP)
README
# XSS Exploitation Tool
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities.
# Features
- Technical Data about victim browser
- Geolocation of the victim
- Snapshot of the hooked/visited page
- Source code of the hooked/visited page
- Exfiltrate input field data
- Exfiltrate cookies
- Keylogging
- Display alert box
- Redirect user# Installation
## Using Docker
Build the image:
```
$ docker-compose -f docker-compose.yml up -d
```This will spin up the server and the database, visit the page http://localhost:8000 to see the XSS Exploitation Tool interface.
## On host
> Tested on Debian 12
Install Git and pull the XSS-Exploitation-Tool source code:
```
$ sudo apt-get install git
$ cd /tmp
$ git clone https://github.com/Sharpforce/XSS-Exploitation-Tool.git
```Install XET:
```
$ cd ./XSS-Exploitation-Tool/bin/
$ sudo chmod +x ./install.sh
$ sudo ./install.sh
```Visit the page http://localhost:8000 to see the XSS Exploitation Tool interface.
# How it works
Access the file `index.html`: http://localhost:8000/demo/ or exploit a Cross-Site Scripting vulnerability to insert the Javascript hook file:
```
?vulnerable_param=
```Then, when victims visit the hooked page, the XSS Exploitation Tool server should list the hooked browsers.
# Demo

## Disclaimer
This tool is intended for educational purposes only and should be used exclusively in authorized penetration testing environments. Unauthorized access to or use of systems that you do not own is illegal. The author is not responsible for any misuse of this tool.
## License
This project is licensed under the GPL-3.0.