Categories: Kali Linux

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website or you can use this tool to Get Shells, Sends, Deface, cPanels & Databases.

Currently tol is supported by CMS like WordPress, Joomla, Drupal, PrestaShop, and LokoMedia.

Also Read Blind-Bash : Project To Obfuscate Your Bash Code

XAttacker Installation

Linux Installation

git clone https://github.com/Moham3dRiahi/XAttacker.git
cd XAttacker
perl XAttacker.pl

Windows Installation

Download Perl
Download XAttacker
Extract XAttacker into Desktop
Open CMD and type the following commands:
cd Desktop/XAttacker-master/
perl XAttacker.pl

Android Installation

git clone https://github.com/Moham3dRiahi/XAttacker.git
cd XAttacker
chmod +x termux-install.sh
bash termux-install.sh

Video

Scan and Exploit Examples

  • If you have list of target websites saved in text file(list.txt) then you can run tool with this command line

perl XAttacker.pl -l list.txt

  • If you don’t have list of target websites then run the tool with this command below

perl XAttacker.pl

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

1 month ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

1 month ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

1 month ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

1 month ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

1 month ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

1 month ago