|
6 | 6 |
|
7 | 7 | # Just a fancy ass banner
|
8 | 8 | print('''%s
|
9 |
| -\tXSStrike %sv3.0.2 |
| 9 | +\tXSStrike %sv3.0.3 |
10 | 10 | %s''' % (red, white, end))
|
11 | 11 |
|
12 | 12 | try:
|
@@ -213,10 +213,10 @@ def singleTarget(target, paramData, verbose, encoding):
|
213 | 213 | print ('%s Efficiency: %i' % (info, bestEfficiency))
|
214 | 214 | print ('%s Confidence: %i' % (info, confidence))
|
215 | 215 |
|
216 |
| -def multiTargets(scheme, host, main_url, form, domURL, verbose, blindXSS, blindPayload): |
| 216 | +def multiTargets(scheme, host, main_url, form, domURL, verbose, blindXSS, blindPayload, headers, delay, timeout): |
217 | 217 | signatures = set()
|
218 | 218 | if domURL and not skipDOM:
|
219 |
| - response = requests.get(domURL).text |
| 219 | + response = requester(domURL, {}, headers, True, delay, timeout).text |
220 | 220 | highlighted = dom(response)
|
221 | 221 | if highlighted:
|
222 | 222 | print ('%s Potentially vulnerable objects found at %s' % (good, domURL))
|
@@ -316,7 +316,7 @@ def bruteforcer(target, paramData, payloadList, verbose, encoding):
|
316 | 316 | for i in range(difference):
|
317 | 317 | domURLs.append(0)
|
318 | 318 | threadpool = concurrent.futures.ThreadPoolExecutor(max_workers=threadCount)
|
319 |
| - futures = (threadpool.submit(multiTargets, scheme, host, main_url, form, domURL, verbose, blindXSS, blindPayload) for form, domURL in zip(forms, domURLs)) |
| 319 | + futures = (threadpool.submit(multiTargets, scheme, host, main_url, form, domURL, verbose, blindXSS, blindPayload, headers, delay, timeout) for form, domURL in zip(forms, domURLs)) |
320 | 320 | for i, _ in enumerate(concurrent.futures.as_completed(futures)):
|
321 | 321 | if i + 1 == len(forms) or (i + 1) % threadCount == 0:
|
322 | 322 | print('%s Progress: %i/%i' % (info, i + 1, len(forms)), end='\r')
|
|
0 commit comments