{"id":48521613,"url":"https://github.com/kevin-mizu/gmsgadget","last_synced_at":"2026-04-07T21:02:49.520Z","repository":{"id":306315758,"uuid":"1023804797","full_name":"kevin-mizu/GMSGadget","owner":"kevin-mizu","description":"This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) and HTML sanitizers like DOMPurify.","archived":false,"fork":false,"pushed_at":"2026-02-04T11:28:36.000Z","size":390,"stargazers_count":130,"open_issues_count":0,"forks_count":5,"subscribers_count":5,"default_branch":"main","last_synced_at":"2026-02-04T23:41:51.493Z","etag":null,"topics":["bypass","csp","csrf","gadgets","html","html-injection","javascript","pentesting","sanitizer","web","xss"],"latest_commit_sha":null,"homepage":"https://gmsgadget.com/","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/kevin-mizu.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2025-07-21T18:08:53.000Z","updated_at":"2026-02-04T18:52:46.000Z","dependencies_parsed_at":"2025-07-25T00:53:18.071Z","dependency_job_id":"a4fdcf76-6601-40fb-94c6-fbf5f7618672","html_url":"https://github.com/kevin-mizu/GMSGadget","commit_stats":null,"previous_names":["kevin-mizu/gmsgadget"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/kevin-mizu/GMSGadget","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kevin-mizu%2FGMSGadget","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kevin-mizu%2FGMSGadget/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kevin-mizu%2FGMSGadget/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kevin-mizu%2FGMSGadget/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/kevin-mizu","download_url":"https://codeload.github.com/kevin-mizu/GMSGadget/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kevin-mizu%2FGMSGadget/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31528752,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-07T16:28:08.000Z","status":"ssl_error","status_checked_at":"2026-04-07T16:28:06.951Z","response_time":105,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bypass","csp","csrf","gadgets","html","html-injection","javascript","pentesting","sanitizer","web","xss"],"created_at":"2026-04-07T21:02:25.361Z","updated_at":"2026-04-07T21:02:49.494Z","avatar_url":"https://github.com/kevin-mizu.png","language":"JavaScript","readme":"# GMSGadget\n\nGMSGadget (Give Me a Script Gadget) is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as \u003ca target=\"_blank\" href=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP\"\u003eContent Security Policy\u003c/a\u003e (CSP) and HTML sanitizers like \u003ca target=\"_blank\" href=\"https://github.com/cure53/DOMPurify\"\u003eDOMPurify\u003c/a\u003e.\n\n*It's important to note that this is not a list of exploits. The gadgets listed here are either patched vulnerabilities or intended JavaScript behaviors that can be leveraged to bypass HTML restrictions.*\n\nThis repository is only here for contributors; please use the website to search through gadgets: https://gmsgadget.com/","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fkevin-mizu%2Fgmsgadget","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fkevin-mizu%2Fgmsgadget","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fkevin-mizu%2Fgmsgadget/lists"}