bXSSRequest icon indicating copy to clipboard operation
bXSSRequest copied to clipboard

Literally spray blind xss payloads everywhere.

bXSSRequest

When I was reading guides on how to find blind XSS I took their advice quite literally and made a tool that would spray payloads at a list of urls or endpoints in request headers.

Advisory: This is meant for ethical purposes, I don't condone any bafoonery.

What do I need to do to make this work?

Add your payloads to the payloads = ['',''] in the script from XSSHunter or your server.

Still testing and will add more stuff later, like a form crawler etc.

Example Commands

python3 bXSSRequest.py -help

python3 bXSSRequest.py file.txt -e -get -user-agent

python3 bXSSRequest.py file.txt -e -post -referer

python3 bXSSRequest.py test.txt -ne -post -cookie

python3 bXSSRequest.py test.txt -e -post -all


Encoding options:

-ne : Plaintext request.

-e : URL encoded request.


Request types:

-get : Get request

-post : Post request


Payload options:

-user-agent : User agent injecton.

-referer : Referer injection.

-cookie : Cookie injection.

-all : Inject all useragent, referer, and cookie.

F.A.Q.

Why is this not in Go?

Because I'm not the kind of person that follows the trend.