@@ -65,6 +65,7 @@ $ xspear -u 'https://www.hahwul.com/?q=123' --cookie='role=admin'
65
65
[ Options ]
66
66
-u, --url=target_URL [required] Target Url
67
67
-d, --data=POST Body [optional] POST Method Body data
68
+ -a, --test-all-params [optional] test to all params(include not reflected)
68
69
--headers=HEADERS [optional] Add HTTP Headers
69
70
--cookie=COOKIE [optional] Add Cookie
70
71
--raw=FILENAME [optional] Load raw file(e.g raw_sample.txt)
@@ -81,7 +82,7 @@ $ xspear -u 'https://www.hahwul.com/?q=123' --cookie='role=admin'
81
82
+ v=3 : show detail log(req/res)
82
83
-h, --help Prints this help
83
84
--version Show XSpear version
84
- --update Show how to update
85
+ --update Show how to update -
85
86
86
87
```
87
88
### Result types
@@ -117,10 +118,10 @@ $ xspear -u "http://testphp.vulnweb.com/search.php?test=query" -t 30
117
118
$ xspear -u "http://testphp.vulnweb.com/search.php?test=query&cat=123&ppl=1fhhahwul" -p cat,test
118
119
```
119
120
120
- ** testing blind xss** <br >
121
+ ** testing blind xss(all params) ** <br >
121
122
(Should be used as much as possible because Blind XSS is everywhere)<br >
122
123
```
123
- $ xspear -u "http://testphp.vulnweb.com/search.php?test=query" -b "https://hahwul.xss.ht"
124
+ $ xspear -u "http://testphp.vulnweb.com/search.php?test=query" -b "https://hahwul.xss.ht" -a
124
125
125
126
# Set your blind xss host. <-b options>
126
127
```
0 commit comments