dalfox
DalFox is a fast, powerful parameter analysis and XSS scanner, based on a golang/DOM parser.
Name:dalfox
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:
quay.io/trickest/dalfox:v2.9.3
Output Type:
License:Unknown
Source:View Source
Parameters
sxss
Use Stored XSS mode--debug
Debug mode--param
Only testing selected parameters--cookie
Add custom cookie--report
Show detail reportpayload
Payload mode, make and enum payloads--worker
Number of worker (default 100)--no-color
Not use colorize--only-poc
Shows only the PoC code for the specified pattern (g: grep / r: reflected / v: verified)--skip-bav
Skipping BAV(Basic Another Vulnerability) analysis--data
Using POST Method and add Body data--proxy
Send all request to proxy server. Example: http://127.0.0.1:8080--mining-dom
Find new parameter in DOM (attribute/js value) (default true)--no-spinner
Not use spinner--output-all
All log write modeurl
Use single target mode--config
Using config from file--deep-domxss
DOM XSS Testing with more payloads on headless [so slow]--method
Force overriding HTTP Method. Example: PUT (default GET)--mining-dict
Find new parameter with dictionary attack, default is Gf-Patterns=>XSS (default true)file
Use file mode(targets list or rawdata)--timeout
Second of timeout (default 10)--found-action
If found weak/vuln, action(cmd) to next. Example: './notify.sh'--ignore-param
Ignore this parameter when scanning. Example: --ignore-param api_token --ignore-param csrf_token--header
Add custom headers--report-format
Format of --report flag [plain/json] (default plain)--skip-grepping
Skipping built-in grepping--skip-headless
Skipping headless browser base scanning[DOM XSS and inJS verify]--format
Stdout output format. Supported plain / json--http
Using force http on rawdata mode--only-discovery
Only testing parameter analysis--cookie-from-raw
Load cookie from burp raw http request. Example: request.txt--custom-payload
Add custom payloads from file--remote-payloads
Using remote payload for XSS testing. Supported: portswigger/payloadbox. Example: portswigger,payloadbox--skip-mining-all
Skipping ALL parameter mining--skip-mining-dom
Skipping DOM base parameter mining--blind
Add your blind xss domain. Example: hahwul.xss.ht--grep
Using custom grepping file.Example: ./samples/sample_grep.json--follow-redirects
Following redirection--mining-dict-word
Custom wordlist file for param mining. Example: word.txt--remote-wordlists
Using remote wordlists for param mining. Supported: burp/assetnote. Example: burp--skip-mining-dict
Skipping Dict base parameter mining--custom-alert-type
Change alert value type. Example: none / str,none (default none)--user-agent
Add custom UserAgent--delay
Milliseconds between send to same host (1000==1s)--rawdata
Using req rawdata from Burp/ZAP--skip-xss-scanning
Skipping XSS Scanning--trigger
Checking this url after inject sxss code. Example: https://~~/profile--custom-alert-value
Change alert value. Example: document.cookie (default 1)--sequence
Set sequence to first number. Example: https://~/view?no=SEQNC 3 (default -1)--ignore-return
Ignore scanning from return code. Example: 302,403,404--silence
Not printing all logs--entity-gf
Enumerate a gf-patterns xss params--enum-attr
Enumerate a in-attr xss payloads--enum-html
Enumerate a in-html xss payloads--enum-injs
Enumerate a in-js xss payloads--make-bulk
Make bulk payloads for stored xss--only-custom-payload
Only testing custom payload (required parameter custom-payloads)--encoder-url
Encoding output--enum-common
Enumerate a common xss payloads--remote-payloadbox
Enumerate a payloadbox's xss payloads--entity-useful-tags
Enumerate a useful tags for xss--remote-portswigger
Enumerate a portswigger xss cheatsheet payloads--entity-event-handler
Enumerate a event handlers for xss--entity-special-chars
Enumerate a special chars for xss