You've already forked hackingtool
mirror of
https://github.com/Z4nzu/hackingtool.git
synced 2025-06-20 06:15:54 +02:00
Refactored the whole project
List of changes + Handling information about a tool has been improved a lot by providing a `HackingTool` class, which takes care of showing the options, running the selected option, executing the required commands + This class is designed with flexibililty and simplicity in mind, so adding a new tool is a lot easier, mention TITLE, DESCRIPTION, list of INSTALL_COMMANDS, RUN_COMMANDS and PROJECT_URL and there you go... + grouping all the `HackingTool`s is also made super simpler by providing a `HackingToolsCollection` class which groups the tools into their respective categories. Just add the instances of `HackingTool` classes to the TOOLS property of the `HackingToolsCollection`. + Refactored all the tools into separate files based on their categories. + Added a READM_template.md and generate_readme.py script to automatically generate Table of contents and the list of tools available automatically. + Now each tool in the README.md points to its project url if provided. This makes it easier to visit the project from the readme.
This commit is contained in:
145
tools/xss_attack.py
Normal file
145
tools/xss_attack.py
Normal file
@ -0,0 +1,145 @@
|
||||
# coding=utf-8
|
||||
import os
|
||||
import subprocess
|
||||
|
||||
from core import HackingTool
|
||||
from core import HackingToolsCollection
|
||||
|
||||
|
||||
class Dalfox(HackingTool):
|
||||
TITLE = "DalFox(Finder of XSS)"
|
||||
DESCRIPTION = "XSS Scanning and Parameter Analysis tool."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo apt-get install golang",
|
||||
"sudo git clone https://github.com/hahwul/dalfox",
|
||||
"cd dalfox;go install"
|
||||
]
|
||||
RUN_COMMANDS = [
|
||||
"~/go/bin/dalfox",
|
||||
'echo "You Need To Run manually by using [!]~/go/bin/dalfox [options]"'
|
||||
]
|
||||
PROJECT_URL = "https://github.com/hahwul/dalfox"
|
||||
|
||||
|
||||
class XSSPayloadGenerator(HackingTool):
|
||||
TITLE = "XSS Payload Generator"
|
||||
DESCRIPTION = "XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/capture0x/XSS-LOADER.git",
|
||||
"cd XSS-LOADER;sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd XSS-LOADER;sudo python3 payloader.py"]
|
||||
PROJECT_URL = "https://github.com/capture0x/XSS-LOADER.git"
|
||||
|
||||
|
||||
class XSSFinder(HackingTool):
|
||||
TITLE = "Extended XSS Searcher and Finder"
|
||||
DESCRIPTION = "Extended XSS Searcher and Finder"
|
||||
INSTALL_COMMANDS = [
|
||||
"git glone https://github.com/Damian89/extended-xss-search.git"]
|
||||
PROJECT_URL = "https://github.com/Damian89/extended-xss-search"
|
||||
|
||||
def after_install(self):
|
||||
print("""\033[96m
|
||||
Follow This Steps After Installation:-
|
||||
\033[31m [*] Go To extended-xss-search directory,
|
||||
and Rename the example.app-settings.conf to app-settings.conf
|
||||
""")
|
||||
input("Press ENTER to continue")
|
||||
|
||||
def run(self):
|
||||
print("""\033[96m
|
||||
You have To Add Links to scan
|
||||
\033[31m[!] Go to extended-xss-search
|
||||
[*] config/urls-to-test.txt
|
||||
[!] python3 extended-xss-search.py
|
||||
""")
|
||||
|
||||
|
||||
class XSSFreak(HackingTool):
|
||||
TITLE = "XSS-Freak"
|
||||
DESCRIPTION = "XSS-Freak is an XSS scanner fully written in python3 from scratch"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/PR0PH3CY33/XSS-Freak.git",
|
||||
"cd XSS-Freak;sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd XSS-Freak;sudo python3 XSS-Freak.py"]
|
||||
PROJECT_URL = "https://github.com/PR0PH3CY33/XSS-Freak"
|
||||
|
||||
|
||||
class XSpear(HackingTool):
|
||||
TITLE = "XSpear"
|
||||
DESCRIPTION = "XSpear is XSS Scanner on ruby gems"
|
||||
INSTALL_COMMANDS = ["gem install XSpear"]
|
||||
RUN_COMMANDS = ["XSpear -h"]
|
||||
PROJECT_URL = "https://github.com/hahwul/XSpear"
|
||||
|
||||
|
||||
class XSSCon(HackingTool):
|
||||
TITLE = "XSSCon"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/menkrep1337/XSSCon.git",
|
||||
"sudo chmod 755 -R XSSCon"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/menkrep1337/XSSCon"
|
||||
|
||||
def run(self):
|
||||
website = input("Enter Website >> ")
|
||||
os.system("cd XSSCon;")
|
||||
subprocess.run(["python3", "xsscon.py", "-u", website])
|
||||
|
||||
|
||||
class XanXSS(HackingTool):
|
||||
TITLE = "XanXSS"
|
||||
DESCRIPTION = "XanXSS is a reflected XSS searching tool\n " \
|
||||
"that creates payloads based from templates"
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/Ekultek/XanXSS.git"]
|
||||
PROJECT_URL = "https://github.com/Ekultek/XanXSS"
|
||||
|
||||
def run(self):
|
||||
os.system("cd XanXSS ;python xanxss.py -h")
|
||||
print("\033[96m You Have to run it manually By Using\n"
|
||||
" [!]python xanxss.py [Options]")
|
||||
|
||||
|
||||
class XSSStrike(HackingTool):
|
||||
TITLE = "Advanced XSS Detection Suite"
|
||||
DESCRIPTION = "XSStrike is a python script designed to detect and exploit XSS vulnerabilites."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo rm -rf XSStrike",
|
||||
"git clone https://github.com/UltimateHackers/XSStrike.git "
|
||||
"&& cd XSStrike && pip install -r requirements.txt"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/UltimateHackers/XSStrike"
|
||||
|
||||
def __init__(self):
|
||||
super(XSSStrike, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class RVuln(HackingTool):
|
||||
TITLE = "RVuln"
|
||||
DESCRIPTION = "RVuln is multi-threaded and Automated Web Vulnerability " \
|
||||
"Scanner written in Rust"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/iinc0gnit0/RVuln.git;"
|
||||
"curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;"
|
||||
"source $HOME/.cargo/env",
|
||||
"sudo apt install openssl-dev;sudo cp -r RVuln/ /usr/bin"
|
||||
]
|
||||
RUN_COMMANDS = ["RVuln"]
|
||||
PROJECT_URL = "https://github.com/iinc0gnit0/RVuln"
|
||||
|
||||
|
||||
class XSSAttackTools(HackingToolsCollection):
|
||||
TITLE = "XSS Attack Tools"
|
||||
TOOLS = [
|
||||
Dalfox(),
|
||||
XSSPayloadGenerator(),
|
||||
XSSFinder(),
|
||||
XSSFreak(),
|
||||
XSpear(),
|
||||
XSSCon(),
|
||||
XanXSS(),
|
||||
XSSStrike(),
|
||||
RVuln()
|
||||
]
|
Reference in New Issue
Block a user