{"id":3766,"date":"2014-07-30T23:59:52","date_gmt":"2014-07-30T15:59:52","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3766"},"modified":"2015-11-13T22:49:01","modified_gmt":"2015-11-13T14:49:01","slug":"xssya-cross-site-scripting-xss-scanner-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2014\/07\/xssya-cross-site-scripting-xss-scanner-tool\/","title":{"rendered":"XSSYA – Cross Site Scripting (XSS) Scanner Tool"},"content":{"rendered":"

XSSYA is a Cross Site Scripting Scanner & Vulnerability Confirmation Tool, it’s written in Python and works by executing an encoded payload to bypass Web Application Firewalls (WAF) which is the first method request and response. If the website\/app responds 200 it attempts to use “Method 2” which searches for the payload decoded in the web page HTML code if it confirmed get the last step which is to execute document.cookie to get the cookie.<\/p>\n

\"XSSYA<\/p>\n

XSSYA Features<\/strong><\/p>\n