0l4bs Save

Cross-site scripting labs for web application security enthusiasts

Project README

0l4bs

Screenshoot
Cross-site scripting labs for web application security enthusiasts

List of Chall :

~ Chall 1 | URL
~ Chall 2 | Form
~ Chall 3 | User-Agent
~ Chall 4 | Referrer
~ Chall 5 | Cookie
~ Chall 6 | LocalStorage
~ Chall 7 | Login Page
~ Chall 8 | File Upload
~ Chall 9 | Base64 Encoding
~ Chall 10 | Removes Alert
~ Chall 11 | Removes Script
~ Chall 12 | Preg_replace
~ Chall 13 | HTML Entities
~ Chall 14 | Regex Filter #1
~ Chall 15 | Regex Filter #2
~ Chall 16 | Regex Filter #3
~ Chall 17 | HTML Entities + URL Encode
~ Chall 18 | HTML Entities #2 (Special Character)
~ Chall 19 | HTML Entities #3 (Input Value)
~ Chall 20 | HTML Entities #4 (Input Value + Capitalizes)

Screenshot :

Screenshoot
Screenshoot

Instalation :

  • Run your web server (XAMPP / LAMPP)
  • Clone the repository and put the files in the /htdocs/xss-labs
  • You can akses http://localhost:8080/xss-labs
  • Happy Hacking ^_^

Run this image

To run this image you need docker installed. Just run the command:

docker run --name web-ctf -d -it -p 80:80 hightechsec/xsslabs

Deploy Manually Docker image

  • Clone this repo (git clone https://github.com/tegal1337/0l4bs)
  • Then run docker build -t "xsslabs" . and wait untill it's done
  • If the build is clear, run this command docker run --name web-ctf -d -it -p 80:80 xsslabs

Write Up / Articles

0l4bs XSS Labs (https://tegalsec.org/0l4bs-cross-site-scripting-labs-for-web-application-security-enthusiasts/)
跨站脚本攻击实验室:0l4bs (https://zhuanlan.zhihu.com/p/108023848)
0l4bs XSS实验 (https://icssec.club/2020/02/25/0l4bs-XSS/)
Kitploit (https://www.kitploit.com/2020/02/0l4bs-cross-site-scripting-labs-for-web.html?m=0)

Support our organization by giving donations

Foo

Open Source Agenda is not affiliated with "0l4bs" Project. README Source: tegal1337/0l4bs
Stars
278
Open Issues
0
Last Commit
2 years ago
Repository
License

Open Source Agenda Badge

Open Source Agenda Rating