You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/page/modes/server-mode.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,9 @@ nav_order: 4
7
7
toc: true
8
8
layout: page
9
9
---
10
+
11
+
# Server Mode
12
+
10
13
`server` mode is a REST API mode that takes into account scalability. Using this mode, dalfox acts as a REST API server and can perform scanning using a web request.
Copy file name to clipboardExpand all lines: docs/page/modes/sxss-mode.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,9 @@ nav_order: 4
7
7
toc: true
8
8
layout: page
9
9
---
10
+
11
+
# Stored XSS Mode
12
+
10
13
`sxss` mode is a mode for easy identification of Stored XSS. The default behavior is the same as url mode, but you can specify a separate URL to validate, and you can generate a dynamic verification URL with the --sequence option in case the verification URL changes.
Copy file name to clipboardExpand all lines: docs/page/output-handling.md
+29-22Lines changed: 29 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,20 +6,25 @@ toc: true
6
6
layout: page
7
7
---
8
8
9
-
## Use dalfox output to other tools via Pipeline
9
+
# Output Handling
10
+
11
+
This guide provides detailed instructions on how to handle the output from Dalfox. You can use various methods to save, filter, and process the output according to your needs.
12
+
13
+
## Use Dalfox Output to Other Tools via Pipeline
14
+
You can pipe the output of Dalfox to other tools for further processing. For example, you can use `grep` to filter the output and `xargs` to open URLs in a browser.
The HAR file can be opened with tools like [HAR Viewer](http://www.softwareishard.com/har/viewer/) for detailed inspection of the HTTP requests and responses.
Copy file name to clipboardExpand all lines: docs/page/overview.md
+11-34Lines changed: 11 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,42 +4,19 @@ nav_order: 1
4
4
layout: page
5
5
---
6
6
7
-
DalFox is a powerful open-source tool designed for automation, making it ideal for efficiently scanning and analyzing parameters to detect XSS vulnerabilities. Its advanced testing engine and unique features streamline the process of identifying and verifying security flaws.
7
+
# Overview
8
8
9
-
As for the name, Dal([달](https://en.wiktionary.org/wiki/달)) is the Korean word for "moon," while Fox stands for "Finder Of XSS" (🦊).
9
+
DalFox is a powerful open-source tool designed for automated detection of XSS vulnerabilities. With its advanced testing engine and comprehensive feature set, DalFox simplifies the process of scanning, analyzing parameters, and verifying vulnerabilities. Whether you are performing quick scans or detailed analyses, DalFox provides a streamlined experience tailored to the needs of security professionals and researchers.
10
10
11
11

12
12
13
-
Mode: `url``sxss``pipe``file``server``payload`
13
+
The name "DalFox" has a unique origin:
14
+
-**Dal ([달](https://en.wiktionary.org/wiki/달))**: The Korean word for "moon."
|| Parameter Mining | - Find new param with Dictionary attack (default is [GF-Patterns](https://github.com/1ndianl33t/Gf-Patterns))<br />- Support custom dictionary file (`--mining-dict-word`)<br />- Find new param with DOM<br />- Use remote wordlist to mining (`--remote-wordlists`) |
21
-
|| Built-in Grepping | - It Identify the basic info leak of SSTi, Credential, SQL Error, and so on |
22
-
|| WAF Detection and Evasion | - Detect to WAF(Web Application Firewall). <br />- if found waf and using special flag, evasion using slow request<br />- `--waf-evasion`|
23
-
| Scanning | XSS Scanning | - Reflected XSS / Stored XSS / DOM XSS<br />- DOM base verifying<br />- Headless base verifying<br />- Blind XSS testing with param, header(`-b` , `--blind` options)<br />- Only testing selected parameters (`-p`, `--param`)<br />- Only testing parameter analysis (`--only-discovery`) |
24
-
|| Friendly Pipeline | - Single url mode (`dalfox url`)<br />- From file mode (`dalfox file urls.txt`)<br />- From IO(pipeline) mode (`dalfox pipe`)<br />- From raw http request file mode (`dalfox file raw.txt --rawdata`) |
25
-
|| Optimization query of payloads | - Check the injection point through abstraction and generated the fit payload.<br />- Eliminate unnecessary payloads based on badchar |
26
-
|| Encoder | - All test payloads(built-in, your custom/blind) are tested in parallel with the encoder.<br />- To Double URL Encoder<br />- To HTML Hex Encoder |
27
-
|| Sequence | - Auto-check the special page for stored xss (`--trigger`) <br />- Support (`--sequence`) options for Stored XSS , only `sxss` mode |
28
-
| HTTP | HTTP Options | - Overwrite HTTP Method (`-X`, `--method`)<br />- Follow redirects (`--follow-redirects`)<br />- Add header (`-H`, `--header`)<br />- Add cookie (`-C`, `--cookie`)<br />- Add User-Agent (`--user-agent`)<br />- Set timeout (`--timeout`)<br />- Set Delay (`--delay`)<br />- Set Proxy (`--proxy`)<br />- Set ignore return codes (`--ignore-return`)<br />- Load cookie from raw request (`--cookie-from-raw`) |
|| N * hosts | - Use multicast mode (`--multicast`) , only `file` / `pipe` mode |
31
-
| Output | Output | - Only the PoC code and useful information is write as Stdout<br />- Save output (`-o`, `--output`) |
32
-
|| Format | - JSON / Plain (`--format`) |
33
-
|| Printing | - Silence mode (`--silence`)<br />- You may choose not to print the color (`--no-color`)<br />- You may choose not to print the spinner (`--no-spinner`)<br />- You may choose show only special poc code (`--only-poc`) |
34
-
|| Report | - Show detail report (`--report` and `--report-format=<plain/json>`)|
35
-
| Extensibility | REST API | - API Server and Swagger (`dalfox server`) |
36
-
|| Payload Mode | - Generate and Enumerate Payloads for XSS Testing (`dalfox payload`) |
37
-
|| Found Action | - Lets you specify the actions to take when detected. <br />- Notify, for example (`--found-action`) |
38
-
|| Custom Grepping | - Can grep with custom regular expressions on response<br />- If duplicate detection, it performs deduplication (`--grep`) |
39
-
|| Custom Payloads | - Use custom payloads list file (`--custom-payload`) <br />- Custom alert value (`--custom-alert-value`) <br />- Custom alert type (`--custom-alert-type`)|
40
-
|| Remote Payloads | - Use remote payloads from portswigger, payloadbox, etc.. (`--remote-payloads`) |
0 commit comments