Name:xspear
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:
quay.io/trickest/xspear:1.4.1Output Type:
License:Unknown
Source:View Source
Parameters
--paramTest paramters--cookieAdd Cookie--no-xssDon't test XSS, only parameters analysis--headersAdd HTTP Headers--raw-sslhttp/https switch for burp raw file--threadsThreads , default: 10--dataPOST Method Body data--urlTarget Url--configUse config file-bAdd vector of Blind XSS. With XSS Hunter, ezXSS, HBXSS... e.g: https://hahwul.xss.ht--rawLoad raw file(e.g raw_sample.txt)--outputOutput format (cli , json, html)--verboseShow log depth. 0: quite mode(only result) 1: show scanning status(default) 2: show scanning logs 3: show detail log(req/res)--test-all-paramsTest to all params(include not reflected)--custom-payloadLoad custom payload json file