X9
Table of Contents
๐งช x9 โ Passive XSS Discovery Tool
x9 is a powerful tool for discovering potential Cross-Site Scripting (XSS) vulnerabilities from passive URL sources.
Focused on automation, filtering, and alerting โ built for bug bounty hunters and researchers who want to catch XSS with minimal false positives.
๐ What It Does
- ๐ธ Collects passive URLs from:
- Waybackurls
- GAU (GetAllURLs)
- Katana (optional)
- ๐ Filters and extracts only relevant URLs
- ๐งผ Removes noise like static assets and non-parameterized links
- ๐งฌ Optionally discovers hidden parameters with
fallparams - ๐งจ Injects payloads into filtered URLs
- ๐ข Sends alerts on detection (via Discord Webhook)
- ๐ Outputs can be saved, piped to Nuclei, or used in CI flows
๐งฐ Components
| File | Role |
|---|---|
x9_passive.py |
Gathers passive URLs and filters out noise |
x9_fuzz.py |
Splits and prepares URLs for fuzzing |
x9.py |
Main XSS payload injector |
x9_run.py |
Orchestrates passive + fuzz + detection + alerting |
โ๏ธ Installation
git clone https://github.com/electro0nes/x9.git
cd x9
pip install -r requirements.txt