Press ESC to close

XAttacker: Website Vulnerability Scanner & Auto Exploiter

XATTACKER: Massive Exploiting Tool

About XATTACKER

XATTACKER is a robust and comprehensive tool designed for scanning and auto-exploiting vulnerabilities in web applications. By providing a target website to the tool, it automatically detects the site's architecture, identifies if it is using a Content Management System (CMS), and attempts to find vulnerabilities based on the detected CMS. After identifying vulnerabilities, XATTACKER generates an exploit for the website and provides the user with the exploit link.

Usage

Short FormLong FormDescription
-l--listWebsites List

Example:

If you have a list of websites, run the tool with the following command:

perl XAttacker.pl -l list.txt

Main Features

  • Vulnerability Scanner: Scans target websites for vulnerabilities.
  • Auto-Exploiting: Automatically exploits detected vulnerabilities.
  • Content Management System Attacker: Targets specific CMS platforms for vulnerabilities.
  • Dork Search with Multiple Search Engines: Utilizes dork searches to find potential targets across various search engines.
  • Reporting: Generates plain text reports of the findings and exploits.

Supported Systems Vulnerability List

  • WordPress
  • Joomla
  • PrestaShop
  • Drupal
  • Lokomedia

Installation

Linux

git clone https://github.com/Moham3dRiahi/XAttacker.git
cd XAttacker
perl XAttacker.pl

Android

Download Termux and follow these steps:

git clone https://github.com/Moham3dRiahi/XAttacker.git
cd XAttacker
chmod +x termux-install.sh
bash termux-install.sh

Follow this video: Psyco Tutorials

Windows

Follow these steps:

  • Download and install Perl.
  • Download XAttacker and extract it to your Desktop.
  • Open CMD and run the following commands:
cd Desktop/XAttacker-master/
perl XAttacker.pl

Disclaimer

This tool is for educational purposes only. Usage of XATTACKER for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Leave a comment

Your email address will not be published. Required fields are marked *