Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities

License

Notifications You must be signed in to change notification settings

pikpikcu/XRCross

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

141 Commits

Repository files navigation

XRCross (Recon)

Details

About XRCross

XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. 
This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities 

✔️ Options:

 Example: 
 XRCross -u/--url example.site <arguments>
 
 
 Optional Arguments:
 -h /--help | show this help message and exit
 -u /--url | URLs
 -a /--aws | Amazon S3 bucket enumeration
 -p /--proxy | URL of the proxy server (default: http://127.0.0.1:8080)
 -s /--subdo | Check Subdomains Enumerations
 -m /--map | Domain Mapping with dnsdumster
 -l /--live | Check live the Subdomains for working HTTP and HTTPS servers
 -hr/--header | Host header injection 
 -sm/--smuggling | HTTP request smuggling 
 -t /--takeover | Check Posible Takeover
 -cr/--cors | CORS misconfiguration scanner
 --flash | Basic cors misconfig flash
 -d /--dir | Dir enumeration
 -w /--wordlists | Wordlist file to use for enumeration. (default wordlists/wordlists.txt)
 -lp/--lfiparam | Get LFI Parameters 
 --lfiv | LFI Check Vulnerabilty
 -st/--ssti | Get parameter SSTI Vulnerabilty 
 --sstiv | Test Vulnerabilty SSTI
 -ss/--ssrf | Get SSRF Parameters 
 --blind | Blind SSRF testing Vulnerabilty
 -c /--cmd | Get Command Injection Parameter
 --cmdv | Command Injection Check Vulnerabilty
 -r /--redirect | Get redirec Parameters
 --rev | Get Vulnerabilty Open-redirect
 -x /--xss | Get XSS Parameters 
 --xssv | XSS Scanners Vulnerabilty
 -j /--jstatus | Get Status JavaScript 
 --jsurl | Gathering all js urls and extract endpoints from js file
 -pr/--param 
 --idor | Get IDOR Parameters
 --rce | Get RCE Parameters
 --sqli | Get SQLI Parameters
 --img | Get img-traversal Parameters
 --int | Interestingparams
 -w /--wayback | Scraping wayback for data
 --js | Jsurls 
 --php | Phpurls
 --asp | ASP
 --html | Html
 -v /--verbose | verbose mode
 -o /--outfile | outfile 

✔️ How to install XRCross:

root@kali~# git clone https://github.com/pikpikcu/xrcross.git

root@kali~# ./install.sh

root@kali~# ./XRCross -h

Open folder config/ and edit file:
 |-> Api-github.txt <(inssert github token)
 |-> ssrf.txt <(inssert ssrf payload)
 |-> xss.ht <(inssert your.xss.ht)

✔️ Go language dependency:

All the dependent libraries are compiled with go version 1.14.2. So go version 1.14.2 should be installed
(strictly). Secondly, $GOPATH should be set to /root/go and it should be exported to PATH using "export PATH=$PATH:$GOROOT/bin/:$GOPATH/bin" 
and same should be present in profile or bash_profile or bashrc. XRCross checks for all the go dependencies under ~/go/bin.

✔️ Donate!

(I love coffee and am very addicted to coffee:v)
Buy Me A Coffee

✔️ Contribution & License

You can contribute in following ways:

  • Give suggestions to make it better
  • Fix issues & submit a pull request

Credits Thanks:

About

XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Contributors 2

Languages

AltStyle によって変換されたページ (->オリジナル) /