Home

Awesome

made-with-Go

<h1 align="center">Airixss</h1> <br> <p align="center"> <a href="#--usage--explanation">Usage</a> • <a href="#--installation--requirements">Installation</a> </p> <h3 align="center">Airixss is for checking reflection in recon process to find possible xss vulnerable endpoints.</h3> <img src="https://cdn.discordapp.com/attachments/686610076575858701/975905092421165066/unknown.png">

Contents:

- Installation & Requirements:

Installing the tool ->

Using go

▶ go install github.com/ferreiraklet/airixss@latest

Using git clone

▶ git clone https://github.com/ferreiraklet/airixss.git
▶ cd airixss
▶ go build airixss.go
▶ chmod +x airixss
▶ ./airixss -h
<br>

- Usage & Explanation:

In Your recon process, you may find endpoints that can be vulnerable to xss,

<br>

Stdin - Single urls

Attention

If you want to test xss, then, for better results, please provide the full payload in -p tag, Ex: -p '"><svg onload=confirm(1)>'

echo 'https://redacted.com/index.php?user=%22%3E%3Csvg%20onload%3Dconfirm%281%29%3E' | airixss -payload '"><svg onload=confirm(1)>'

echo "http://testphp.vulnweb.com:80/hpp/index.php?pp=x" | bhedak '"><svg onload=confirm(1)>' | airixss -p '"><svg onload=confirm(1)>'

In -payload flag, you need to specify a part of the payload used in url, -payload "value_will_be_checked_reflection"

Stdin - Read from File

cat targets | airixss -payload '"><svg onload=confirm(1)>'

Adding Headers

Pay attention to the syntax!

echo "http://testphp.vulnweb.com:80/hpp/index.php?pp=x" | qsreplace '"><svg onload=confirm(1)>' | airixss -p "confirm(1)" -H "header1: value1" -H "header2: value2"

Using Proxy

echo "http://testphp.vulnweb.com:80/hpp/index.php?pp=x" | qsreplace '"><svg onload=confirm(1)>' | airixss -p "confirm(1)" -x "http://yourproxy"

Chaining with other tools

echo "http://testphp.vulnweb.com" | waybackurls | anew | gf xss | qsreplace '"><svg onload=confirm(1)>' | airixss -p "confirm(1)" -H "Header1: Value1"

echo "http://testphp.vulnweb.com" | waybackurls | nilo | anew | gf xss | urldedupe -qs | bhedak '"><svg onload=confirm(1)>' | airixss -p "confirm(1)" --proxy "http://yourproxy"

echo "http://testphp.vulnweb.com" | waybackurls | nilo | anew | gf xss | qsreplace -a | bhedak '"><svg onload=confirm(1)>' | airixss -p "confirm(1)" -x "http://yourproxy"

Check out some of my other programs <br>

Nilo - Checks if URL has status 200

Jeeves - Time based blind Injection Scanner

Please, also check these => <br>

GXSS

Dalfox

If any error in the program, talk to me immediatly.

This project is for educational and bug bounty porposes only! I do not support any illegal activities!.