The latest weapons for automated search and exploitation of vulnerabilities in a site.
Hackers Academy last edited by
Everything written in this article is invented and does not call you to illegal actions. Know, if you want to use the material for your own purposes, this can lead to criminal liability. All information is provided for informational purposes only! Getting started...
Today I introduce you to the latest weapons for the automated search and exploitation of vulnerabilities such as xss.
I think that you can appreciate the potential of this sinister framework.
And he is the largest framework for working with such vulnerabilities.
There is also a gui launch option.
Here is a picture that awaits you at the same time with settings and other tasks.
Types of requests, work through tor-proxy, in general, everything is taken into account.
It’s easier to list what is not in it.
I apologize for the screenshots, because there are so many options that it was impossible to fit everything.
git clone https://github.com/epsylon/xsser.git
cd xsser /
cd xsser / this is not an error, just go to the directory of the same name
python setup.py install
./xsser --gtk (graphical interface)
In order to better understand the tool, evaluate and not lose time on settings and analysis of options, I am attaching you a link where you can see the video and description of the operating instructions.
Login in your account to Start Chat