Skip to content

ferreiraklet/airixss

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

Airixss


UsageInstallation

Airixss is for checking reflection in recon process to find xss vulnerable endpoints.

- Installation & Requirements:

> go install github.com/ferreiraklet/airixss@latest

OR

> git clone https://github.com/ferreiraklet/airixss.git

> cd airixss

> go build airixss.go

> chmod +x airixss

> ./airixss -h

- Usage & Explanation:

  • In Your recon process, you may find endpoints that can be vulnerable to xss,

  • By replacing the "SameValue" to a xss payload, In order to see if there is reflection/vulnerable, it is when you use airixss

  • Lets say you have a url and you want to test reflection:

    Airixss reads from stdin:

    echo 'https://redacted.com/index.php?user="><img src=x onerror=confirm(1)>' | airixss -payload 'confirm(1)'

    In -payload flag, you need to specify a part of the payload used in url, -payload "value_will_be_checked_reflection"


    You can use a file containing a list of targets as well:

    cat targets | airixss -payload "alert(1)"


  • You can make use of Airixss with other tools such gau, gauplus, waybackurls, qsreplace and bhedak

    • Another examples of usage:

    echo "http://testphp.vulnweb.com:80/hpp/index.php?pp=x" | qsreplace '"><img src=x onerror=prompt(1)>' | airixss -payload '<img src=x onerror=prompt(1)>'
    echo "http://testphp.vulnweb.com:80/hpp/index.php?pp=x" | bhedak '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)"

    You can use with proxy:

    echo "http://testphp.vulnweb.com" | waybackurls | anew | gf xss | qsreplace '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)" --proxy "http://yourproxy"

    You can specify more than one header, OBS: Be careful, the syntax must be exact the same, Ex:

    echo "http://testphp.vulnweb.com" | waybackurls | anew | gf xss | qsreplace '"><svg onload=confirm(1)>' | airixss -payload "confirm(1) -H "Header1: Value1;Header2: value2"


This project is for educational and bug bounty porposes only! I do not support any illegal activities!.

If any error in the program, talk to me immediatly.