Skip to content

K3res/eXelion

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

56 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

eXelion

        __   __         _   _                 
        \ \ / /        | | (_)                
   ___   \ V /    ___  | |  _    ___    _ __  
  / _ \   > <    / _ \ | | | |  / _ \  | '_ \ 
 |  __/  / . \  |  __/ | | | | | (_) | | | | |
  \___| /_/ \_\  \___| |_| |_|  \___/  |_| |_|
                      
    
    Version: 0.5 
            
    Author:               K3res
    Github:               https://github.com/K3res/
    Check it Out!:        https://github.com/B0lg0r0v/


Table of Content

Description

eXeleion is a simple tool designed to inject XXE payloads and display the results directly in the terminal.
It can also be used to crawl your target URL and search for all XML data interactions.
Additionally, you can customize your request headers and body to send to your URL and observe the response.

🔧 This tool is still a work in progress, and changes may be implemented as development continues

General Informations

The tool will always show your request and response for your target
For the following options -he, -b, -x, -c you must use the single qutoes '' to customs your Header and Body/XXE Payload

python3 eXelion.py -he 'header: header' -b 'Body is there' -u http://google.com

image

Use the -st option to display all available templates. Subsequently, you can customize variables such as the protocol and paths.

python3 eXelion.py -xlfi -vfp '/tmp/test.txt' -vp 'htpp'

image



To search for XML interactions, use the -cr option. Additionally, you can view all URLs identified without XML interactions by using the -crv option.
Note: The duration may vary depending on performance and network connection.

python3 eXelion.py -crv -u https://0a2a006c04b11c5881400c75008b0050.web-security-academy.net/

image

Usage

usage: eXelion.py [options]

Tools for XXE/XEE Payloads

options:
  -h, --help            show this help message and exit

Request options:
  -u URL, --url URL     The URL target http://example.com/XML
  -he HEADERS, --headers HEADERS
                        Use custom headers
  -c COOKIE, --cookie COOKIE
                        Use custom cookie
  -b BODY, --body BODY  Use custom body
  -x XXE, --xxe XXE     Use custom XXE payload
  -xf XXEFILE, --xxefile XXEFILE
                        Use custom XML file with XXE payload

Special options:
  -cr, --crawlex        search on the website for XML interactions
  -crv, --crawlexverbose
                        display all crawled URLs, even if no XML was found
  -t, --time            give the finish time back
  -drh, --disableResponseHeader
                        Disable the display of the response header
  -drb, --disableResponseBody
                        Disable the display of the response body

Templates options:
  -st, --showTemplates  show all availible templates
  -xfd, --xxeFileDisclosure
                        Use a XXE template to read a file (default value= /etc/shadow)
  -xebl, --xeeBillionLaughs
                        Use the Billion laughs template(DoS attack)
  -xlfi, --xxeLocalFileInclusion
                        Use a XXE template to read a file (default value= /etc/shadow, with LFI)
  -xblfi, --xxeBlindLocalFileInclusion
                        Use a XXE template to read a file (default value= /etc/shadow, with Blind LFI)
  -xacb, --xxeAccessControlBypass
                        Use a XXE bypass to read a PHP file
  -xs, --xxeSSRF        Use a XXE template with a SSRF

Variable Templates Options:
  -vfp VARIABLEFILEPATH, --variableFilePath VARIABLEFILEPATH
                        Variable to change the file path with the file path
  -ve VARIABLEENTITY, --variableEntity VARIABLEENTITY
                        Variable to change the entity name
  -vp VARIABLEPROTOCOL, --variableProtocol VARIABLEPROTOCOL
                        Varaible to change the protocol type
  -vsu VARIABLESSRF, --variableSSRF VARIABLESSRF
                        Varaible to change the URL for SSRF attacks
  -vulfi VARIABLEURLLFI, --variableUrlLFI VARIABLEURLLFI
                        Varaible to change the URL for LFI attacks

Features Overview

📤 Customize your own request.
📑 Input your own XXE payloads or load an XML file containing your payloads.
📝 Use and customize the XXE templates.
🔎 Search a website for XML interactions.

Comming soon

⚙️ Pip install features
⚙️ Improve tool performance
⚙️ Function to use a wordlist for the variables in templates
⚙️ Function to Create a SVG data with XXE Payload
⚙️ Interactive Function to create you own XXE Payload
⚙️ Function to create a extern dtd data
⚙️ Function for XML injection
⚙️ Function for XPATH Injection

Installation

Install eXelion:

git clone https://github.com/K3res/eXelion.git
cd eXelion/corex
pip3 install -r requirements.txt

Notes

Check out B0lg0r0v's GitHub site for interesting tools like Elyzer or Elixier.

Disclaimer

This project, including the hacking tool, was developed solely to enhance my coding skills. Users of this tool are fully responsible for any consequences arising from its use.

About

XXE Injection tool

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages