![]() |
features <ul><li>XSS scanning based on pattern matchingTest request/response to bypass XSS protection and mirrored parameters (or all)Blind XSS testingDynamic/static analysis</li> <li>Get information (e.g. sql error, filtered rule, reflected parameters, etc.)</li> <li>Vulnerable XSS, Checked alert/prompt/confirm with Selenium</li> <li>Low level problem</li> <li>medium level problem</li> <li>High level issue</li> </ul> https://github.com/hahwul/XSpear |
All times are GMT. The time now is 12:37 AM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.