Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/fyxme/blistener
Blind-XSS listener with payloads to the target user's browser data including cookies, local/session storage, html code, screenshot of current page (HTTP listener optionally)
https://github.com/fyxme/blistener
blind-xss golang http http-listener javascript listener payloads xss
Last synced: 3 months ago
JSON representation
Blind-XSS listener with payloads to the target user's browser data including cookies, local/session storage, html code, screenshot of current page (HTTP listener optionally)
- Host: GitHub
- URL: https://github.com/fyxme/blistener
- Owner: fyxme
- Created: 2021-08-08T10:56:44.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2021-08-20T13:03:37.000Z (about 3 years ago)
- Last Synced: 2024-06-26T00:36:31.659Z (5 months ago)
- Topics: blind-xss, golang, http, http-listener, javascript, listener, payloads, xss
- Language: Go
- Homepage:
- Size: 4.24 MB
- Stars: 8
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- WebHackersWeapons - blistener - XSS listener with payloads|![](https://img.shields.io/github/stars/fyxme/blistener?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| (Weapons / Tools)
README
# Blistener (Blind-XSS listener)
Code was written quickly during a CTF and should probably be refactored. Not going to change it for now since it's working. I'll refactor when I add new features to it.
It has 2 exploits, one which will take all data available on the page including the html code and the other which will also take a screenshot of the page as well as all the data on the page.
## Compiling
```
go build blistener.go
```## Usage
1. Create an output directory where the listener will store html code and png images from the xss pages it identifies
2. Start the listener:
```
./blistener
```3. Use one of the payloads to trigger an XSS
## Exploit strings
```
# The normal payloads will grab all content from the page including the html source# The extended payloads do the same as the normal payloads except that they also take a screenshot of the page
# You call also use a normal request to make sure the XSS can be trigger such as:
# Simple cookie grabber
```_Note: The listener is on port 8899 by default, change to another port if you need._
## Example trigger
![example trigger](.github/img/example.png)
## Todo
- Add cli flags
- Refactor code