XSSMAP
Detect XSS vulnerability in Web Applications
Usage mimics sqlmap, and if you know sqlmap, you can easily handle xssmap!
Screenshots
Easy Installation
As simple as below, Just one line of code:
curl -L -s https://raw.githubusercontent.com/Jewel591/xssmap/master/docs/install.sh|bash
Usage Instructions
python3.6 xssmap.py -h
Support POST and GET request methods, support parameter injection detection in cookie, referer, useragent fields For example, test the returnUrl parameter in POST data:
python3.6 xssmap.py -u "https://example.com/login.do" --data="returnUrl=utest" -p returnUrl
Features
- Support url encoding bypass
- Support unicode encoding of HTML tag attribute value to bypass
- Support HTML encoding to bypass the HTML tag attribute value
- Support for flexible replacement of () '"to bypass
- Case bypass
Contributing
Contributions, issues and feature requests are welcome!
Feel to check issues page
Maintainers
License
MIT © Jewel591, Kyle