Skip to content

Commit 01deed5

Browse files
committed
[update] 添加evilpot信息
1 parent cb8b04a commit 01deed5

File tree

2 files changed

+25
-8
lines changed

2 files changed

+25
-8
lines changed

README.md

+12-4
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ xapp是一款专注于web指纹识别的工具。你可以使用xapp对web目标
6262
xray webscan --basic-crawler http://example.com --html-output vuln.html
6363
```
6464

65-
1. 使用 HTTP 代理进行被动扫描
65+
2. 使用 HTTP 代理进行被动扫描
6666

6767
```bash
6868
xray webscan --listen 127.0.0.1:7777 --html-output proxy.html
@@ -71,13 +71,13 @@ xapp是一款专注于web指纹识别的工具。你可以使用xapp对web目标
7171

7272
>如需扫描 https 流量,请阅读下方文档 `抓取 https 流量` 部分
7373

74-
1. 只扫描单个 url,不使用爬虫
74+
3. 只扫描单个 url,不使用爬虫
7575

7676
```bash
7777
xray webscan --url http://example.com/?a=b --html-output single-url.html
7878
```
7979

80-
1. 手动指定本次运行的插件
80+
4. 手动指定本次运行的插件
8181

8282
默认情况下,将会启用所有内置插件,可以使用下列命令指定本次扫描启用的插件。
8383

@@ -86,7 +86,7 @@ xapp是一款专注于web指纹识别的工具。你可以使用xapp对web目标
8686
xray webscan --plugins cmd-injection,sqldet --listen 127.0.0.1:7777
8787
```
8888

89-
1. 指定插件输出
89+
5. 指定插件输出
9090

9191
可以指定将本次扫描的漏洞信息输出到某个文件中:
9292

@@ -173,6 +173,14 @@ xray的进步离不开各位师傅的支持,秉持着互助共建的精神,
173173

174174
## 🔧周边生态
175175

176+
### POC质量确认靶场
177+
178+
[**Evil Pot**](https://github.com/chaitin/xray/tree/master/tests/evilpot)
179+
180+
一个专门用于让扫描器产生误报的靶场
181+
182+
编写插件应该尽量避免能在这个靶场扫描出结果
183+
176184
### POC编写辅助工具
177185

178186
该工具可以辅助生成POC,且在线版支持**poc查重**,本地版支持直接发包验证

README_EN.md

+13-4
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Project address: https://github.com/chaitin/xray-plugins
6262
xray webscan --basic-crawler http://example.com --html-output vuln.html
6363
```
6464

65-
1. Use HTTP proxy for passive scanning
65+
2. Use HTTP proxy for passive scanning
6666

6767
```bash
6868
xray webscan --listen 127.0.0.1:7777 --html-output proxy.html
@@ -71,13 +71,13 @@ Project address: https://github.com/chaitin/xray-plugins
7171
7272
> To scan HTTPS traffic, please read the "Capture HTTPS Traffic" section below.
7373
74-
1. Scan a single URL without using a crawler
74+
3. Scan a single URL without using a crawler
7575
7676
```bash
7777
xray webscan --url http://example.com/?a=b --html-output single-url.html
7878
```
7979
80-
1. Manually specify plugins for this run
80+
4. Manually specify plugins for this run
8181
8282
By default, all built-in plugins will be enabled. You can specify the plugins to be enabled for this scan with the following commands.
8383
@@ -86,7 +86,7 @@ Project address: https://github.com/chaitin/xray-plugins
8686
xray webscan --plugins cmd-injection,sqldet --listen 127.0.0.1:7777
8787
```
8888
89-
1. Specify Plugin Output
89+
5. Specify Plugin Output
9090
9191
You can specify to output the vulnerability information of this scan to a file:
9292
@@ -175,6 +175,15 @@ Refer to: https://docs.xray.cool/#/guide/contribute
175175
176176
## 🔧 Surrounding Ecosystem
177177
178+
179+
### POC Quality Confirmation Range
180+
181+
[**Evil Pot**](https://github.com/chaitin/xray/tree/master/tests/evilpot)
182+
183+
A range specifically designed to allow scanners to generate false positives
184+
185+
Plugins should be written to try to avoid being able to scan results in this range
186+
178187
### POC Writing Assistant Tools
179188
180189
This tool can assist in generating POCs, and the online version supports **POC duplication checks**, while the local version supports direct packet verification.

0 commit comments

Comments
 (0)