Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/dragthor/xss-scanner
Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows.
https://github.com/dragthor/xss-scanner
xss xss-detection xss-exploitation xss-scanner xss-testing xss-vulnerability
Last synced: 22 days ago
JSON representation
Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows.
- Host: GitHub
- URL: https://github.com/dragthor/xss-scanner
- Owner: dragthor
- License: mit
- Created: 2017-02-27T14:41:22.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2017-03-19T13:47:07.000Z (over 7 years ago)
- Last Synced: 2024-11-16T21:33:59.955Z (26 days ago)
- Topics: xss, xss-detection, xss-exploitation, xss-scanner, xss-testing, xss-vulnerability
- Language: JavaScript
- Homepage:
- Size: 19.5 KB
- Stars: 12
- Watchers: 2
- Forks: 5
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - dragthor/xss-scanner - Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows. (JavaScript)
README
# xss-scanner
Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. It's intended use is to help "plug" the vulnerability, *not* exploit. Be nice. Make the web better.[![Build Status](https://travis-ci.org/dragthor/xss-scanner.svg?branch=master)](https://travis-ci.org/dragthor/xss-scanner) [![npm version](https://badge.fury.io/js/xss-scanner.svg)](https://badge.fury.io/js/xss-scanner)
The three most important countermeasures to prevent cross-site scripting attacks are to:
* Constrain input.
* Encode output.
* Filter user input.Url encode output URLs if they are constructed from input.
Html encode output if it contains input from the user or from other sources such as databases.
Cross platform - macOS, Linux, and Windows. It's also working my Raspberry Pi 3 Model B.
## Installation
`npm install`## Configuration
Open up the `config.js` file and configure the `xssOptions()` return object.## Run
`npm start`## Results
The console shows the XSS parameter values that have made it back with a status code 200. You can also dump the resulting Html to a file. Unfortunately, you have to manually check these. I prefer to use the latest version of Firefox with add-ons and extensions disabled. Other XSS tools, such as Burp Suite, also require some manual checking.At the top of the Html content, look for a ``. It contains the offending XSS injection payload value.
## Additional Resources
[OWASP XSS Cheatsheet](https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet)