Skip to content

orf/xcat

Folders and files

NameName
Last commit message
Last commit date

Latest commit

d0b12cc · Jan 11, 2023
Mar 31, 2021
Dec 9, 2018
Aug 25, 2020
Mar 31, 2021
May 20, 2020
Dec 8, 2018
Dec 8, 2018
Sep 10, 2015
May 20, 2020
Aug 13, 2014
Mar 24, 2020
Jan 11, 2023
Dec 8, 2018
Dec 9, 2018
May 20, 2020
Mar 31, 2021
Mar 26, 2020

Repository files navigation

XCat

Python package Rawsec's CyberSecurity Inventory

XCat is a command line tool to exploit and investigate blind XPath injection vulnerabilities.

For a complete reference read the documentation here: https://xcat.readthedocs.io/en/latest/

It supports an large number of features:

  • Auto-selects injections (run xcat injections for a list)

  • Detects the version and capabilities of the xpath parser and selects the fastest method of retrieval

  • Built in out-of-bound HTTP server

    • Automates XXE attacks
    • Can use OOB HTTP requests to drastically speed up retrieval
  • Custom request headers and body

  • Built in REPL shell, supporting:

    • Reading arbitrary files
    • Reading environment variables
    • Listing directories
    • Uploading/downloading files (soon TM)
  • Optimized retrieval

    • Uses binary search over unicode codepoints if available
    • Fallbacks include searching for common characters previously retrieved first
    • Normalizes unicode to reduce the search space

Install

Run pip install xcat

Or using docker: docker run -it tomforbes/xcat --help

Or on fedora, dnf install xcat 😎

Requires Python 3.7. You can easily install this with pyenv: pyenv install 3.7.1

Example application

There is a complete demo application you can use to explore the features of XCat. See the README here: https://github.com/orf/xcat_app