FINDER'X v2.3.1 Ultimate is an advanced, automated vulnerability scanner designed for detecting Cross-Site Scripting (XSS) and other web vulnerabilities. It features a robust engine capable of crawling, bypassing WAFs, and verifying vulnerabilities using a headless browser to reduce false positives.
- 🎯 Multi-Targeting: Scan a single URL or load a list of domains from a file.
- 🕷️ Smart Crawling: Automatically crawls the target to find hidden parameters and endpoints.
- 🛡️ WAF Bypass: Includes specialized payloads designed to evade Web Application Firewalls.
- 🤖 Headless Verification: Verifies XSS execution in a real browser environment to eliminate false positives.
- ⏱️ Rate Limiting: Configurable delay to prevent server blocking or DoS.
- 🔄 Proxy Support: Route traffic through HTTP proxies (e.g., Burp Suite) for analysis.
- 📝 Custom Payloads: Fully customizable payload injection via external files.
- 💾 Auto-Save: Automatically logs vulnerable URLs and reports.
-
🐍 Python 3.x
-
📦 Dependencies:
requests,selenium(for verification)(Ensure you have the necessary browser drivers installed if using
--verify)
-
Clone the Repository:
git clone https://github.com/INTELEON404/FINDERX.git cd FINDERX -
Install the Dependencies:
pip install -r requirements.txt
pip install requests selenium
FINDER'X uses command-line arguments for flexibility.
python3 finderx.py [options]| Flag | Long Flag | Description |
|---|---|---|
-h |
--help |
Show the help message and exit. |
-u |
--url |
Specify a single target URL. |
-f |
--file |
Load a list of URLs from a specific file. |
-l |
--list |
Alias for -f (load from file). |
-p |
--payloads |
Path to a custom payloads file. |
--crawl |
Enable the crawler to find dynamic endpoints. | |
--delay |
Set a delay (in seconds) between requests. | |
--proxy |
Set an HTTP Proxy (e.g., http://127.0.0.1:8080). |
|
--verify |
Enable XSS verification using a headless browser. | |
--waf-bypass |
Attempt to use WAF bypass payloads. |
Scan a specific URL using the default payload set.
python3 finderx.py -u "https://example.com/search.php?q="Scan a list of URLs from targets.txt using payloads from payloads.txt.
python3 finderx.py -f targets.txt -p payloads.txtCrawl the domain, attempt to bypass WAFs, and verify results with a headless browser.
python3 finderx.py -u https://example.com --crawl --waf-bypass --verifyRoute traffic through Tor/Burp and add a 2-second delay to avoid detection.
python3 finderx.py -u https://example.com --proxy http://127.0.0.1:8080 --delay 2Results are displayed in the terminal with color-coded tags:
- 💥 [VULN]: Confirmed Vulnerability.
- ✅ [SAFE]: Payload reflected but not executed (or sanitised).
- 🕷️ [CRAWL]: New link discovered.
- ⚠ [ERROR]: Connection timeout or error.
All findings are automatically saved to results/<domain>-report.txt.
- Permission: Only run this tool on domains you own or have explicit permission to test.
- Intrusiveness: The
--crawland--waf-bypassmodes generate significant traffic. Use--delayto respect server limits. - Legal: The developers assume no liability and are not responsible for any misuse or damage caused by this program.
Contributions are welcome!
- 🍴 Fork the repository.
- 🌱 Create a new branch.
- ✨ Implement your feature.
- 📤 Submit a pull request.
For bugs, suggestions, or private inquiries:
