PROJECT

WebX

TYPE Web App (xss.webx.infy.uk)
DATE April 2025
CATEGORY Security Research

Overview

Loading Animation...

WebX is a powerful and visually immersive platform built to streamline the discovery, exploitation, and monitoring of Blind XSS (Cross-Site Scripting) vulnerabilities. Tailored for ethical hackers, bug bounty hunters, and cybersecurity professionals, WebX offers an all-in-one solution that combines real-time security monitoring with advanced payload management and campaign tracking. The platform features a dynamic dashboard with interactive 3D visualizations and real-time activity logs, making it easier than ever to track and manage security testing across multiple domains.

Key Features

Interactive Dashboard

Real-time visualization of XSS campaign activities with interactive 3D elements and data flow mapping to track cross-site execution paths across domains.

Payload Generator

Advanced payload creation tool with polymorphic generation capabilities, obfuscation techniques, and evasion methods to bypass modern XSS protections.

Campaign Management

Structured approach to organizing multiple XSS testing efforts with timeline tracking, team collaboration features, and comprehensive reporting.

Real-time Monitoring

Live tracking of payload execution with instant notifications, detailed logging of victim interactions, and session recording for post-exploitation analysis.

Technical Details

WebX is built using a modern tech stack focused on performance and real-time capabilities. The frontend is developed with HTML and Three.js for the 3D visualizations, while the backend leverages Python and Flask. Real-time functionality is achieved through Firebase Realtime Database and WebSockets, ensuring instant updates across all connected clients. The platform also incorporates sophisticated algorithms for payload generation and obfuscation, making it highly effective in bypassing security measures.

Python
# /test-blind-xss route handler
@app.route('/test-blind-xss', methods=['POST'])
def test_blind_xss():
    """Simulate a Blind XSS callback for testing purposes."""
    import random
    import time
    import json
    from datetime import datetime

    # Generate a random test domain
    test_domains = [
        "testapp.example.com",
        "admin.vulnerable-site.org",
        "dashboard.test-victim.net",
        "internal.corp-victim.com",
        "cms.webapp-test.io"
    ]

    test_domain = random.choice(test_domains)
    test_path = f"/{random.choice(['admin', 'dashboard', 'panel', 'settings', 'users'])}"
    test_url = f"https://{test_domain}{test_path}"

    # Generate a random IP address
    test_ip = f"{random.randint(10, 200)}.{random.randint(0, 255)}.{random.randint(0, 255)}.{random.randint(1, 254)}"

    # Simulate a realistic user agent
    user_agents = [
        "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36",
        "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.1 Safari/605.1.15",
        "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36",
        "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0"
    ]
    test_user_agent = random.choice(user_agents)

    # Prepare the XSS data
    xss_data = {
        "url": test_url,
        "referrer": f"https://{test_domain}/",
        "cookies": f"session={random.getrandbits(128):x}; user_id={random.randint(1000, 9999)}; theme=dark",
        "localStorage": json.dumps({
            "lastVisit": str(int(time.time()) - random.randint(3600, 86400)),
            "preferences": json.dumps({"notifications": True, "sidebar": "collapsed"}),
            "auth_token": f"{random.getrandbits(64):x}"
        }),
        "dom": "<truncated for size>",
        "userAgent": test_user_agent,
        "timestamp": datetime.now().strftime("%Y-%m-%d %H:%M:%S"),
        "ip": test_ip,
        "isTest": True
    }

    try:
        if db:
            activity_ref = db.collection('activities').document()
            xss_data["script_url"] = f"{request.host_url.rstrip('/')}xss.js?test=true"

            activity_data = {
                'type': 'hit',
                'title': f'Test XSS Hit from {test_domain}',
                'description': f'TEST: XSS payload triggered on {test_url}',
                'timestamp': firestore.SERVER_TIMESTAMP,
                'data': xss_data,
                'domain': test_domain,
                'ip': test_ip,
                'campaign': 'Test Campaign',
                'reviewed': False,
                'test': True
            }
            activity_ref.set(activity_data)

            return jsonify({
                'success': True,
                'message': 'Test XSS callback successfully simulated and stored.',
                'details': {
                    'domain': test_domain,
                    'ip': test_ip
                }
            })
        else:
            if 'test_xss_hits' not in session:
                session['test_xss_hits'] = []
            xss_data["script_url"] = f"{request.host_url.rstrip('/')}xss.js?test=true"
            session['test_xss_hits'].append({
                'domain': test_domain,
                'url': test_url,
                'ip': test_ip,
                'timestamp': datetime.now().strftime("%Y-%m-%d %H:%M:%S"),
                'data': xss_data
            })

            return jsonify({
                'success': True,
                'message': 'Test XSS callback simulated (session storage only).',
                'details': {
                    'domain': test_domain,
                    'ip': test_ip
                }
            })

    except Exception as e:
        app.logger.error(f"Error while simulating XSS callback: {e}")
        return jsonify({
            'success': False,
            'message': f'Error simulating XSS callback: {str(e)}'
        }), 500

Technologies Used

HTML Three.js Flask Firebase WebSockets JavaScript CSS3

Impact & Results

WebX has revolutionized the way security professionals approach XSS testing and monitoring. By providing a centralized platform for payload management, campaign tracking, and real-time monitoring, WebX has significantly reduced the time and effort required to identify and exploit XSS vulnerabilities. The platform's intuitive interface and powerful features have made it a go-to tool for bug bounty hunters and security teams worldwide, resulting in the discovery of numerous critical vulnerabilities in high-profile applications.

500+
Active Users
2,300+
Vulnerabilities Found
98%
Detection Rate

Interested in working together?