{"id":13842072,"url":"https://github.com/Medicean/VSCodeXssEncode","last_synced_at":"2025-07-11T13:33:51.157Z","repository":{"id":218714983,"uuid":"315580633","full_name":"Medicean/VSCodeXssEncode","owner":"Medicean","description":"Converts characters from one encoding to another using a transformation. This tool will help you encode payloads in testing sql injections, XSS holes and site security.","archived":false,"fork":false,"pushed_at":"2021-05-16T08:46:17.000Z","size":109,"stargazers_count":9,"open_issues_count":0,"forks_count":1,"subscribers_count":3,"default_branch":"master","last_synced_at":"2024-11-15T11:35:30.585Z","etag":null,"topics":["base64","converts-characters","decode","encode","md5","sha1","string-hex","vscode-extension"],"latest_commit_sha":null,"homepage":"","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Medicean.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2020-11-24T09:24:39.000Z","updated_at":"2021-12-22T02:57:49.000Z","dependencies_parsed_at":"2024-01-23T13:04:53.019Z","dependency_job_id":null,"html_url":"https://github.com/Medicean/VSCodeXssEncode","commit_stats":null,"previous_names":["medicean/vscodexssencode"],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Medicean%2FVSCodeXssEncode","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Medicean%2FVSCodeXssEncode/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Medicean%2FVSCodeXssEncode/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Medicean%2FVSCodeXssEncode/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Medicean","download_url":"https://codeload.github.com/Medicean/VSCodeXssEncode/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225729837,"owners_count":17515175,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["base64","converts-characters","decode","encode","md5","sha1","string-hex","vscode-extension"],"created_at":"2024-08-04T17:01:26.870Z","updated_at":"2024-11-21T12:30:51.044Z","avatar_url":"https://github.com/Medicean.png","language":"JavaScript","readme":"# xssencode\n\nConverts characters from one encoding to another using a transformation. This tool will help you encode payloads in testing sql injections, XSS holes and site security.\n\nConvert the region you selected or convert all characters.\n\n## Support\n\n* String \u003c=\u003e Base64, Base32, Base16\n* String \u003c=\u003e Hex\n* String \u003c=\u003e EncodedURL\n* String \u003c=\u003e Encoded URL All Characters\n* IPv4 \u003c=\u003e Number\n* String =\u003e HTML Entities\n* String =\u003e HTML10\n* String =\u003e HTML16\n* (HTML Entities, HTML10, HTML16) =\u003e String\n* String =\u003e MD5 (32bit, 16bit)\n* String =\u003e SHA1, SHA224, SHA256, SHA384, SHA512\n* String =\u003e StringFromCharCode (10 Decimal, 8 Octal, 16 Hex)\n* String =\u003e PHP CHR (10 Decimal, 8 Octal, 16 Hex)\n* String =\u003e Python chr (10 Decimal, 8 Octal, 16 Hex)\n* String =\u003e Oracle CHR (10 Decimal, 8 Octal, 16 Hex)\n* String =\u003e MySQL CHAR (10 Decimal, 8 Octal, 16 Hex)\n* UnChr (StringFromCharCode, CHR, CHAR =\u003e String)\n* String \u003c=\u003e Rot13\n* String \u003c=\u003e Unicode\n* String \u003c=\u003e Morse\n* String =\u003e Bash\n* String =\u003e PowerShell\n* String =\u003e Python\n* String =\u003e Perl\n* String =\u003e RandomCase\n\n\n## ChangeLog\n\nSee more at [ChangeLog](./CHANGELOG.md)\n\n## Example Commands\n\nYou can open the command palette by pressing (`Ctrl+Shift+P` or `Cmd+Shift+P` on Mac), type xssencode and choice your action.\n\n* String \u003c=\u003e Base64\n\neg:\n\n```\na1@\u0026 \u003c=\u003e YTFAJg==\n```\n\n* String \u003c=\u003e Base32\n\neg:\n\n```\na1@\u0026 \u003c=\u003e MEYUAJQ=\n```\n\n* String \u003c=\u003e Base16\n\neg:\n\n```\nabc \u003c=\u003e 616263\n```\n\n* String \u003c=\u003e Hex\n\neg:\n\n```\nabc \u003c=\u003e 616263\n```\n\n* String \u003c=\u003e EncodedURL\n\neg:\n\n```\na=b\u0026c=d \u003c=\u003e a%3Db%26c%3Dd\n```\n\n* String \u003c=\u003e Encoded URL All Characters\n\neg:\n\n```\na=b\u0026c=d \u003c=\u003e %61%3d%62%26%63%3d%64\n```\n\n* IPv4 \u003c=\u003e Number\n\neg:\n\n```\n192.168.1.1 \u003c=\u003e 3232235777\n```\n\n* String =\u003e HTML Entities\n\neg:\n\n```\n123!@#' =\u003e 123\u0026excl;\u0026commat;\u0026num;\u0026apos;\n```\n\n* String =\u003e HTML10\n\neg:\n\n```\n123!@#' =\u003e \u0026#49;\u0026#50;\u0026#51;\u0026#33;\u0026#64;\u0026#35;\u0026#39;\n```\n\n* String =\u003e HTML16\n\neg:\n\n```\n123!@#' =\u003e \u0026#x31;\u0026#x32;\u0026#x33;\u0026#x21;\u0026#x40;\u0026#x23;\u0026#x27;\n```\n\n* (HTML Entities, HTML10, HTML16) =\u003e String\n\neg:\n\n```\n123\u0026excl;\u0026commat;\u0026num;\u0026apos; =\u003e 123!@#'\n\n\u0026#49;\u0026#50;\u0026#51;\u0026#33;\u0026#64;\u0026#35;\u0026#39; =\u003e 123!@#'\n\n\u0026#x31;\u0026#x32;\u0026#x33;\u0026#x21;\u0026#x40;\u0026#x23;\u0026#x27; =\u003e 123!@#'\n```\n\n* String =\u003e MD5 (32bit, 16bit)\n\neg:\n\n```\n123 =\u003e 202cb962ac59075b964b07152d234b70\n123 =\u003e ac59075b964b0715\n```\n\n* String =\u003e SHA1, SHA224, SHA256, SHA384, SHA512\n\neg:\n\n```\n123 =\u003e 40bd001563085fc35165329ea1ff5c5ecbdbbeef\n123 =\u003e 78d8045d684abd2eece923758f3cd781489df3a48e1278982466017f\n123 =\u003e a665a45920422f9d417e4867efdc4fb8a04a1f3fff1fa07e998e86f7f7a27ae3\n123 =\u003e 9a0a82f0c0cf31470d7affede3406cc9aa8410671520b727044eda15b4c25532a9b5cd8aaf9cec4919d76255b6bfb00f\n123 =\u003e 3c9909afec25354d551dae21590bb26e38d53f2173b8d3dc3eee4c047e7ab1c1eb8b85103e3be7ba613b31bb5c9c36214dc9f14a42fd7a2fdb84856bca5c44c2\n```\n\n* String =\u003e StringFromCharCode (10 Decimal, 8 Octal, 16 Hex)\n\neg:\n\n```\nabc =\u003e String.fromCharCode(97,98,99)\nabc =\u003e String.fromCharCode(0141,0142,0143)\nabc =\u003e String.fromCharCode(0x61,0x62,0x63)\n```\n\n* String =\u003e PHP CHR (10 Decimal, 8 Octal, 16 Hex)\n\neg:\n\n```\nabc =\u003e ChR(97).ChR(98).cHr(99)\nabc =\u003e ChR(0141).CHR(0142).cHR(0143)\nabc =\u003e chr(0x61).Chr(0x62).CHr(0x63)\n```\n\n* String =\u003e Python chr (10 Decimal, 8 Octal, 16 Hex)\n\neg:\n\n```\nabc =\u003e chr(97)+chr(98)+chr(99)\nabc =\u003e chr(0141)+chr(0142)+chr(0143)\nabc =\u003e chr(0x61)+chr(0x62)+chr(0x63)\n```\n\n* String =\u003e Oracle CHR (10 Decimal, 8 Octal, 16 Hex)\n\neg:\n\n```\nabc =\u003e chr(97)||chR(98)||Chr(99)\nabc =\u003e CHR(0141)||cHR(0142)||cHR(0143)\nabc =\u003e cHR(0x61)||ChR(0x62)||chr(0x63)\n```\n\n* String =\u003e MySQL CHAR (10 Decimal, 8 Octal, 16 Hex)\n\neg:\n\n```\nabc =\u003e CHAr(97,98,99)\nabc =\u003e ChAR(0141,0142,0143)\nabc =\u003e ChAR(0x61,0x62,0x63)\n```\n\n* UnChr (StringFromCharCode, CHR, CHAR =\u003e String)\n\neg:\n\n```\nchr(97)+chr(98)+chr(99) =\u003e abc\nChR(97).CHR(0141).chr(0x61) =\u003e aaa\n```\n\n* String \u003c=\u003e Rot13\n\neg:\n\n```\nabc \u003c=\u003e nop\n```\n\n* String \u003c=\u003e Unicode\n\neg:\n\n```\n转为 unicode \u003c=\u003e \\u8f6c\\u4e3a\\u0020\\u0075\\u006e\\u0069\\u0063\\u006f\\u0064\\u0065\n```\n\n* String \u003c=\u003e Morse\n\n\u003e short =\u003e `.`\n\u003e long =\u003e `-`\n\u003e space =\u003e `\u003cspace\u003e` or `/`\n\neg:\n\n```\nMORSE电码 \u003c=\u003e -- --- .-. ... . ---.-.-..--.-.- ----..........-\n\n--/---/.-./..././---.-.-..--.-.-/----..........- =\u003e MORSE电码\n```\n\n* String =\u003e Bash/PowerShell/Python/Perl\n\n\u003e java.lang.Runtime.exec() Payload Workarounds\n\n```\nls -al / =\u003e bash -c {echo,bHMgLWFsIC8g}|{base64,-d}|{bash,-i}\nnet user =\u003e powershell.exe -NonI -W Hidden -NoP -Exec Bypass -Enc bgBlAHQAIAB1AHMAZQByAA==\nls -al / =\u003e python -c exec('bmV0IHVzZXJscyAtYWwgLw=='.decode('base64'))\nls -al / =\u003e perl -MMIME::Base64 -e eval(decode_base64('bmV0IHVzZXJscyAtYWwgLw=='))\n```\n\n* String =\u003e RandomCase\n\neg:\n\n```\nphpinfo(); =\u003e phPiNfo();\nphpinfo(); =\u003e PhpINFo();\n```\n","funding_links":[],"categories":["JavaScript (485)","JavaScript"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FMedicean%2FVSCodeXssEncode","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FMedicean%2FVSCodeXssEncode","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FMedicean%2FVSCodeXssEncode/lists"}