Skip to content

Commit

Permalink
0.1 version release
Browse files Browse the repository at this point in the history
  • Loading branch information
CrazyProger1 committed Aug 12, 2023
1 parent 9209959 commit a2e2843
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 37 deletions.
3 changes: 3 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -158,3 +158,6 @@ cython_debug/
# and can be added to the global gitignore or merged into this file. For a more nuclear
# option (not recommended) you can uncomment the following to ignore the entire idea folder.
.idea/

# Options file
options.toml
33 changes: 1 addition & 32 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<a href="https://github.com/CrazyProger1/Simle-XSS/blob/master/LICENSE"><img alt="GitHub" src="https://img.shields.io/github/license/CrazyProger1/Simle-XSS"></a>
<a href="https://github.com/CrazyProger1/Simle-XSS/releases/latest"><img alt="GitHub release (latest by date)" src="https://img.shields.io/github/v/release/CrazyProger1/Simle-XSS"></a>


Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool. This application will help you
create a hook that can easily
and reliably catch a client by downloading a payload to their browser and executing it. You don't even need a white IP
Expand Down Expand Up @@ -54,8 +53,6 @@ Hook has the following structure:

**package.toml** - metadata file, contains data about hook such as name, description, author and version.

_To create custom hook, follow these steps:_

### Payload

> _Payloads folder: [payloads](payloads)_
Expand Down Expand Up @@ -83,37 +80,9 @@ Payload has the following structure:
**init.py** - python file, imported when loading payload. Allows you to interact with the client side of payload
(payload.js) via WebSockets protocol.

_To create custom payload, follow these steps:_

- Create payload folder in [.\payloads](payloads) and go into

```shell
cd payloads
mkdir my_payload
cd my_payload
```

- Then create main file

```shell
echo "alert(1)" > payload.js
```

- Create package file (not required)

```shell
echo "name = 'My Payload'" > package.toml
```

- Create init python file (not required)

```shell
echo "print('Hello, World!')" > init.py
```

### Templating

**Inbuilt objects** is an objects passed into hook & payload main files
**Built-in objects** is an objects passed into hook & payload main files
using [Jinja](https://jinja.palletsprojects.com/)
templating engine. It contains additional information that may be needed when loading a hook or payload.

Expand Down
5 changes: 0 additions & 5 deletions options.toml

This file was deleted.

0 comments on commit a2e2843

Please sign in to comment.