XSS Rocket is written by Black Hat Ethical Hacking and is designed for Offensive Security and XSS (Cross-Site scripting) attacks.
Shout out and thanks to ShadowDevnotreal
XSS Rocket, uses the Wayback Machine to fetch URLs and filters them based on parameters contained in the URLs. It then filters the URLs with httpx while using multiple Grep and SED patterns to filter only the ones that are alive and valid, removing the contents of the parameters and then uses a remote XSS payload list from Github to send GET requests with the payloads to the filtered URLs injecting them with the XSS Payloads, showcasing the status for 200 and 4XX errors in Red and Green, and creating a Summary for the findings, while saving all the results into a folder that has the same name as the domain name created with all the results, inside it.
It also includes a feature that generates a random Sun Tzu quote for Offensive Security and uses lolcat to display colorful outputs and ASCII art and a check system to ensure that the user is connected to the internet before running it.
What is special about this tool is that technically, is the methodology used and critical thinking behind it for each step that it is doing its action, but also by changing the payload wordlist, you could do more injection based attacks. This means you can modify it, so it can check for SQL Injections, OS Command Injection and so on! - If you do change it, send us a push notification so we can add it! You also get to perform stealth scans by changing the IP before each attack to evade various mechanisms.
• V2 now supports sending the result by email to any email, you can use your own SMTP credentials in order to setup the configuration by editing the script and adding your details.
• Some tweaks and enhancement in performance
• Supports Stealth Mode using Proxychains, for more reliable attacks against defensive mechanisms
• Automatically fetches URLs from the Wayback Machine
• Filters URLs based on parameters contained in the URLs
• Uses httpx to filter only alive URLs and clearing the values for each parameter
• Uses a remote XSS payload list from Github
• Installs all requirements needed depending on the architecture as it gets new updates (Compatible with MacOS, Ubuntu, Debian, Kali)
• Sends GET requests with payload list to URLs
• Detects and reports possible XSS vulnerabilities
• Creates a folder with the domain name to save results
• Prints final message with number of possible vulnerable URLs and a Summary
• Saves result URLs in a file
• Display a random Sun Tzu quote for offensive security
• Check if the user is connected to the internet before running the tool
• Provides a way to append payloads to the URLs
• Output the full URL with payload
This tool with also display a summary feature that displays the total number of possible XSS injections found, along with a list of affected URLs, the payload used, and the response code, at the end.
It will, help you get the bounty of the bug while hunting:
• waybackurls: This tool can be installed by running go install github.com/tomnomnom/waybackurls@latest
• cURL: This tool is commonly pre-installed on Kali Linux and Ubuntu, but can be installed by running apt-get install curl on Ubuntu or brew install curl on MacOS
• figlet: This tool can be installed by running apt-get install figlet on Kali Linux or Ubuntu or brew install figlet on MacOS
• lolcat: This tool can be installed by running gem install lolcat
• wget: This tool is commonly pre-installed on Kali Linux and Ubuntu, but can be installed by running apt-get install wget on Ubuntu or brew install wget on MacOS
git clone https://github.com/blackhatethicalhacking/XSSRocket.git
cd XSSRocket
chmod x XSSRocket.sh
./XSSRocket.sh
Main Menu
This tool has been tested on Kali Linux, Ubuntu and MacOS.
To change the list of payloads, you can edit the tool and set another URL.
This tool is provided for educational and research purpose only. The author of this project are no way responsible for any misuse of this tool. We use it to test under NDA agreements with clients and their consents for pentesting purposes and we never encourage to misuse or take responsibility for any damage caused !
Introducing our Merch Store, designed for the Offensive Security community. Explore a curated collection of apparel and drinkware, perfect for both professionals and enthusiasts. Our selection includes premium t-shirts, hoodies, and mugs, each featuring bold hacking-themed slogans and graphics that embody the spirit of red teaming and offensive security. Hack with style and showcase your dedication to hacker culture with gear that’s as dynamic and resilient as you are. 😊