Documentation ¶
Index ¶
- Variables
- func GenCustomQueryPayload(testPayload string) string
- func GenQueryPayload() (string, string)
- func GetChromeBrowser(copts []func(*chromedp.ExecAllocator)) (context.CancelFunc, context.Context, context.CancelFunc)
- func GetChromeOptions(r *Runner) []func(*chromedp.ExecAllocator)
- func GetJavascript(r *Runner, testPayload string) string
- func GetTestPayload(r *Runner, length int) string
- func PrepareURL(inputURL, testPayload string) (string, error)
- func Scan(ctx context.Context, js, targetURL string) (string, error)
- type Runner
Constants ¶
This section is empty.
Variables ¶
var (
ErrWrongHeaderFormat = errors.New("header with wrong format")
)
Functions ¶
func GenCustomQueryPayload ¶
GenCustomPayload returns a ready to use HTTP GET query with the payload supplied as input.
func GenQueryPayload ¶
GenQueryPayload returns a ready to use HTTP GET query with a random generated payload and the payload used in the query.
func GetChromeBrowser ¶
func GetChromeBrowser(copts []func(*chromedp.ExecAllocator)) (context.CancelFunc, context.Context, context.CancelFunc)
GetChromeBrowser takes as input the chrome options and returns the contexts with the associated cancel functions to use the headless chrome browser it creates.
func GetChromeOptions ¶
func GetChromeOptions(r *Runner) []func(*chromedp.ExecAllocator)
GetChromeOptions takes as input the runner settings and returns the chrome options.
func GetJavascript ¶
GetJavascript returns the Javascript code must be run on the target to verify the vulnerability.
func GetTestPayload ¶
GetTestPayload returns the payload specified as input or a random payload with a specified length.
func PrepareURL ¶
PrepareURL takes as input a URL and a payload and returns the final URL to scan.