Skip to content

Allow Injecting Payloads in URLs Path using requests or other light weight tool instead of selenium #406

@basedygt

Description

@basedygt

Is your feature request related to a problem? Please describe.
Injecting payloads in URLs paths is very slow as it uses selenium by default

Describe the solution you'd like
Adding an additional argument which allows user to inject the payload with requests or other light weight tool should solve this issue

Additional context

For scanning a URL which reflects the value from it's path say https://example.com/file/payload results in file payload not found can be exploited with https://example.com/file/<script>alert(1)</script>

Using xsstrike we can automate it with below command:

python3 xsstrike.py -u "https://example.com/file/payload" --path

However it uses selenium to test payloads which is slow as compared to requests

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions