Skip to content

Scanner

General

nuclei

Fast and customizable vulnerability scanner based on simple YAML.

Github link.

Installation

Download release binary.

Examples

➜ nuclei -disable-update-check -silent -u https://www.xanhacks.xyz
[2022-09-01 05:54:21] [google-floc-disabled] [http] [info] https://www.xanhacks.xyz
[2022-09-01 05:54:26] [metatag-cms] [http] [info] https://www.xanhacks.xyz [Hugo 0.101.0]
[2022-09-01 05:54:27] [tech-detect:jsdelivr] [http] [info] https://www.xanhacks.xyz
[2022-09-01 05:54:36] [ssl-dns-names] [ssl] [info] https://www.xanhacks.xyz [www.xanhacks.xyz]
[2022-09-01 05:54:41] [http-missing-security-headers:content-security-policy] [http] [info] https://www.xanhacks.xyz
[2022-09-01 05:54:41] [http-missing-security-headers:permission-policy] [http] [info] https://www.xanhacks.xyz
[2022-09-01 05:54:41] [http-missing-security-headers:clear-site-data] [http] [info] https://www.xanhacks.xyz
[2022-09-01 05:54:41] [http-missing-security-headers:access-control-allow-headers] [http] [info] https://www.xanhacks.xyz
[2022-09-01 05:54:41] [http-missing-security-headers:x-permitted-cross-domain-policies] [http] [info] https://www.xanhacks.xyz

XSS - Cross Site Scripting

kxss

Request the URLs, check the response body for any reflected parameters. There will be many false positives here.

Github link.

Installation

➜ go install github.com/tomnomnom/hacks/kxss@latest

Examples

➜ echo 'https://example.com/?search=a' | kxss
param search is reflected and allows " on https://example.com/?search=a
param search is reflected and allows ' on https://example.com/?search=a
param search is reflected and allows < on https://example.com/?search=a
param search is reflected and allows > on https://example.com/?search=a