
Eval Villain bởi bemodtwz
Hook native JavaScript functions before page load to see how a website uses them. Narrow down output based on the appearance of URL and session artifacts, user configured strings/regex, blacklists and more.
Bạn sẽ cần Firefox để sử dụng tiện ích mở rộng này
Siêu dữ liệu mở rộng
Ảnh chụp màn hình


Về tiện ích mở rộng này
Eval Villain hooks JavaScript sinks and monitors input for the presence of strings found in sources. There is no race condition as Eval Villain will hook sinks before they can be used. Sinks will be hooked in all frames and pages unless a target URL pattern is configured.
The default configuration will hook common DOM XSS sinks but Eval Villain can be configured to hook any function. Go to the configuration page and click the icon -> configure to see examples.
When a sink is called, Eval Villain goes through a list of sources and tests input to that function for any occurrence of the sources. Sources include user defined strings or regex (referred to as needles), URL parameters, URL fragments (aka hash), local storage, window name and the user cookie. There is also a blacklist feature to remove commonly occurring false positives. Each of these features can be individually enabled or disabled in the popup menu. When changes are made, the page will need to be refreshed for changes to take effect.
These features make Eval Villain well suited to find DOM XSS, but also to answer other questions about how a web page is functioning. Hooking eval() and dumping input can bypass common obfuscation techniques and even find malware. Hooking decodeURI() with the URL parameter source enabled will give a stack trace that often contains the website's URL parser. Instrumenting the parser can then expose hidden URL parameters. Hooking addEventListener() with the needle "message" will dump the source code and location of post message handlers. Eval Villain allows a lot of configuration options to allow for creative solutions.
Eval Villain will also attempt to recursively decode sources. For example, ad networks often build iframes with encoded HTML hidden in the window name. Eval Villain can detect this behavior and provide both the sink where the HTML lands and an encoder function to encode arbitrary HTML into the frame.
Support for this version provided by Doyensec Research https://doyensec.com/research.html
The default configuration will hook common DOM XSS sinks but Eval Villain can be configured to hook any function. Go to the configuration page and click the icon -> configure to see examples.
When a sink is called, Eval Villain goes through a list of sources and tests input to that function for any occurrence of the sources. Sources include user defined strings or regex (referred to as needles), URL parameters, URL fragments (aka hash), local storage, window name and the user cookie. There is also a blacklist feature to remove commonly occurring false positives. Each of these features can be individually enabled or disabled in the popup menu. When changes are made, the page will need to be refreshed for changes to take effect.
These features make Eval Villain well suited to find DOM XSS, but also to answer other questions about how a web page is functioning. Hooking eval() and dumping input can bypass common obfuscation techniques and even find malware. Hooking decodeURI() with the URL parameter source enabled will give a stack trace that often contains the website's URL parser. Instrumenting the parser can then expose hidden URL parameters. Hooking addEventListener() with the needle "message" will dump the source code and location of post message handlers. Eval Villain allows a lot of configuration options to allow for creative solutions.
Eval Villain will also attempt to recursively decode sources. For example, ad networks often build iframes with encoded HTML hidden in the window name. Eval Villain can detect this behavior and provide both the sink where the HTML lands and an encoder function to encode arbitrary HTML into the frame.
Support for this version provided by Doyensec Research https://doyensec.com/research.html
Xếp hạng trải nghiệm của bạn
Quyền hạnTìm hiểu thêm
Tiện ích này cần:
- Truy cập dữ liệu của bạn trên mọi trang web
Thêm thông tin
- Liên kết tiện ích
- Phiên bản
- 2.11
- Kích cỡ
- 53,89 KB
- Cập nhật gần nhất
- 6 tháng trước (13 Thg 11 2024)
- Thể loại có liên quan
- Giấy phép
- GNU General Public License v3.0 only
- Chính sách riêng tư
- Đọc chính sách riêng tư của tiện ích này
- Lịch sử các phiên bản
- Nhãn
Thêm vào bộ sưu tập
Ghi chú phát hành cho phiên bản 2.11
Fixes bug where localStorage is not properly sourced
Improves encoder function for path search
Fixes mistake is sourcer debug statment
Improves encoder function for path search
Fixes mistake is sourcer debug statment
Tiện ích mở rộng khác của bemodtwz
- Chưa có xếp hạng nào
- Chưa có xếp hạng nào
- Chưa có xếp hạng nào
- Chưa có xếp hạng nào
- Chưa có xếp hạng nào
- Chưa có xếp hạng nào