Skip to main content

A command line tool to automate the exploitation of blind XPath injection vulnerabilities

Project description


Python package

XCat is a command line tool to exploit and investigate blind XPath injection vulnerabilities.

For a complete reference read the documentation here:

It supports an large number of features:

  • Auto-selects injections (run xcat injections for a list)

  • Detects the version and capabilities of the xpath parser and selects the fastest method of retrieval

  • Built in out-of-bound HTTP server

    • Automates XXE attacks
    • Can use OOB HTTP requests to drastically speed up retrieval
  • Custom request headers and body

  • Built in REPL shell, supporting:

    • Reading arbitrary files
    • Reading environment variables
    • Listing directories
    • Uploading/downloading files (soon TM)
  • Optimized retrieval

    • Uses binary search over unicode codepoints if available
    • Fallbacks include searching for common characters previously retrieved first
    • Normalizes unicode to reduce the search space


Run pip install xcat

Requires Python 3.7. You can easily install this with pyenv: pyenv install 3.7.1

Example application

There is a complete demo application you can use to explore the features of XCat. See the README here:

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

xcat-1.1.0.tar.gz (15.4 kB view hashes)

Uploaded Source

Built Distribution

xcat-1.1.0-py3-none-any.whl (19.0 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page