Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/dragthor/xss-scanner

Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows.
https://github.com/dragthor/xss-scanner

xss xss-detection xss-exploitation xss-scanner xss-testing xss-vulnerability

Last synced: 22 days ago
JSON representation

Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows.

Awesome Lists containing this project

README

        

# xss-scanner
Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. It's intended use is to help "plug" the vulnerability, *not* exploit. Be nice. Make the web better.

[![Build Status](https://travis-ci.org/dragthor/xss-scanner.svg?branch=master)](https://travis-ci.org/dragthor/xss-scanner) [![npm version](https://badge.fury.io/js/xss-scanner.svg)](https://badge.fury.io/js/xss-scanner)

The three most important countermeasures to prevent cross-site scripting attacks are to:

* Constrain input.
* Encode output.
* Filter user input.

Url encode output URLs if they are constructed from input.

Html encode output if it contains input from the user or from other sources such as databases.

Cross platform - macOS, Linux, and Windows. It's also working my Raspberry Pi 3 Model B.

## Installation
`npm install`

## Configuration
Open up the `config.js` file and configure the `xssOptions()` return object.

## Run
`npm start`

## Results
The console shows the XSS parameter values that have made it back with a status code 200. You can also dump the resulting Html to a file. Unfortunately, you have to manually check these. I prefer to use the latest version of Firefox with add-ons and extensions disabled. Other XSS tools, such as Burp Suite, also require some manual checking.

At the top of the Html content, look for a ``. It contains the offending XSS injection payload value.

## Additional Resources

[OWASP XSS Cheatsheet](https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet)