dalfox file urls.txt --skip-xss-scanning -o reflecting.txt
用於檢查 URL 中反射參數的輕量級工具。靈感來自 @tomnomnom 的 kxss。
go install github.com/KathanP19/Gxss@latest
_____ __ __ _____ _____
| __| | | __| __|
| | |- -|__ |__ |
|_____|__|__|_____|_____|
4.0 - @KathanP19
Usage of Gxss:
-c int
Set the Concurrency (default 50)
-d string
Request data for POST based reflection testing
-h value
Set Custom Header.
-o string
Save Result to OutputFile
-p string
Payload you want to Send to Check Reflection (default "Gxss")
-u string
Set Custom User agent. Default is Mozilla (default "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36")
-v Verbose mode
-x string
Proxy URL. Example: http://127.0.0.1:8080
檢查單一 URL
echo "https://target.com/some.php?first=hello&last=world" | Gxss -c 100
檢查 URL 列表
cat urls.txt | Gxss -c 100 -p XssReflected
將具有反射參數的 URL 保存在文件中以進行進一步分析
cat urls.txt | Gxss -c 100 -o Result.txt
對於詳細模式-v
cat urls.txt | Gxss -c 100 -o Result.txt -v
發送自訂標頭-h
cat urls.txt | Gxss -c 100 -p Xss -h "Cookie: Value"
發送自訂用戶代理-u
cat urls.txt | Gxss -c 100 -p Xss -h "Cookie: Value" -u "Google Bot"
For Example-
Url is https://example.com/?p=first&q=second
First it will check if p param reflects
https://example.com/?p=Gxss&q=second
Then it will check if q param reflects
https://example.com/?p=first&q=Gxss
echo "testphp.vulnweb.com" | waybackurls | httpx -silent | Gxss -c 100 -p Xss | sort -u | dalfox pipe
你可以買杯咖啡