https://github.com/m4cs/traxss
traxss | Automated XSS Vulnerability Scanner Currently In Development :snake: HACKTOBERFEST PROJECT 2019
https://github.com/m4cs/traxss
Last synced: about 2 months ago
JSON representation
traxss | Automated XSS Vulnerability Scanner Currently In Development :snake: HACKTOBERFEST PROJECT 2019
- Host: GitHub
- URL: https://github.com/m4cs/traxss
- Owner: M4cs
- License: mit
- Created: 2019-10-10T04:37:41.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2023-05-22T22:30:47.000Z (about 2 years ago)
- Last Synced: 2025-05-10T19:56:13.579Z (about 2 months ago)
- Language: Python
- Homepage:
- Size: 82 KB
- Stars: 183
- Watchers: 6
- Forks: 49
- Open Issues: 11
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# Traxss
Automated Vulnerability Scanner for XSS | Written in Python3 | Utilizes Selenium Headless
DEMO
# Background
### Traxss is a Hacktoberfest Project! If you are looking for a place to make contribute, please feel free.
Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test with and multiple options for robustness of tests. View the gif above to see a preview of the fastest type of scan.# Getting Started
## Prerequisites
Traxss depends on Chromedriver. On MacOS this can be installed with the homebrew command:
```
brew install cask chromedriver
```Alternatively, find a version for other operating systems here: https://sites.google.com/a/chromium.org/chromedriver/downloads
## Installation
Run the command:
```
pip3 install -r requirements.txt
```## Docker Build
```
docker build -t .
docker build -t xshuden/traxss .
```## Docker Run
```
docker run --rm -it xshuden/traxss
```## Running Traxss
Traxx can be started with the command:
```
python3 traxss.py
```This will launch an interactive CLI to guide you through the process.
## Types of Scans
#### Full Scan w/ HTML
Uses a query scan with 575+ payloads and attempts to find XSS vulnerabilities by passing parameters through the URL. It will also render the HTML and attempt to find manual XSS Vulnerabilities (this feature is still in beta).
#### Full Scan w/o HTML
This scan will run the query scan only.
#### Fast Scan w/ HTML
This scan is the same as the full w/ HTML but it will only use 7 attack vectors rather than the 575+ vectors.
#### Fast Scan w/o HTML
This scan is the same as the fast w/o HTML but it will only use 7 attack vectors rather than the 575+ vectors.
## Contributing
Thank you for your interest! All types of contributions are welcome.
- Fork and clone this repository
- Create your branch from the master branch
- Please open your PR with the master branch as the base