xssSick is a Python script for identifying potential Cross-Site Scripting (XSS) vulnerabilities. It reads URLs from a file, modifies each URL's parameters with a gibberish value containing brackets and signs, and searches the response for reflections and matches. Found URLs are saved to an output file.
- Reads URLs from a file.
- Modifies each URL's parameters with a specific test value containing brackets and signs.
- Sends HTTP requests to the modified URLs.
- Searches the response source code for specific words and signs that indicate XSS possibilities.
- Saves the URLs where matches are found to an output file.
- Displays output in the terminal:
blue
for processed URLs,red
for unreachable URLs, andgreen
for matches (XSS) found. - Experimental (must be enabled manually): Detects DOM XSS (uncomment
dom_possible
function definition and calls).
- Python 3.x
requests
librarycolorama
library
- Clone the repository:
git clone https://github.com/ShrekBytes/xssSick.git
- Navigate to the project directory:
cd xssSick
- Install the required Python libraries:
pip install -r requirements.txt
-
Run the script:
python3 xssSick.py example.com.txt
-
The script will process each URL and save the results to an output file named
<domain>_found_urls.txt
(e.g.,example_found_urls.txt
).
Feel free to submit issues or pull requests for suggestions, improvements, or bug reports. Your contributions are appreciated!
"License? Nah, who needs those bothersome regulations anyway? Feel free to do whatever you want with this code – use it as a doorstop, launch it into space, or frame it as a modern art masterpiece. Just don't blame me if things get a little wild!"
By using this script, you agree that it is for educational purposes only and you have permission to test the URLs you provide. Misuse of this tool can lead to serious consequences. Always obtain proper authorization before testing.