Skip to content
This repository has been archived by the owner on Apr 12, 2022. It is now read-only.
/ maxss Public archive

Simple program to inject blind XSS payloads inside HTTP headers

License

Notifications You must be signed in to change notification settings

amr3k/maxss

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Description

This script injects your blind XSS payload into a set of URLs.

Requirements

  • Linux shell (bash/zsh)
  • Python 3.7+
  • XSShunter account (or your custom blind xss payload)

Installation

  • git clone https://github.com/ShogunExecutioner/maxss.git && cd maxss
  • Install a virtual environment (Optional) python -m venv .env
  • pip install -r requirements.txt

Configuration

  • Add your blind XSS payloads in static/payloads.txt. Note: the more payloads you add, the more time this script will consume

  • Check static/config.json if you want to add an HTTP proxy (Like Burp) or edit other stuff.

    • Proxy should be like http://proxy.com.
    • If you use credentials you can pass them in proxy URL e.g http://user:pass@some.proxy.com
    • Timeout must be float number
  • Check static/extensions.json file if you want to add/remove extensions which will be removed from URL list.

Usage

  • python3 maxss.py -d <domain>

Fetch a URL list related to the target domain from archive.org

By default it will use cached file if found.

To force fetch the newest list, add -a

  • python3 maxss.py [-f <file path>]

Skip scrapping and work on URLs in the provided file.

Known bugs

  • Lack of socks proxy because aiohttp doesn't support it yet.

TODO

☐ Better redirection handling

☐ Adding more scrappers

🗹 WAF detector

🗹 Proxy

🗹 Advanced Logging

Inspiration

Special thanks

About

Simple program to inject blind XSS payloads inside HTTP headers

Topics

Resources

License

Stars

Watchers

Forks

Languages