https://github.com/stamparm/DSXS
Damn Small XSS Scanner
https://github.com/stamparm/DSXS
Last synced: 19 days ago
JSON representation
Damn Small XSS Scanner
- Host: GitHub
- URL: https://github.com/stamparm/DSXS
- Owner: stamparm
- Created: 2011-11-04T17:55:36.000Z (over 13 years ago)
- Default Branch: master
- Last Pushed: 2020-12-01T21:00:21.000Z (over 4 years ago)
- Last Synced: 2025-03-22T20:07:39.878Z (23 days ago)
- Language: Python
- Homepage:
- Size: 57.6 KB
- Stars: 428
- Watchers: 29
- Forks: 129
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-termux-hacking - DSXS - Damn Small XSS Scanner.[](https://github.com/stamparm/DSXS/stargazers/) (Uncategorized / Uncategorized)
- awesome-hacking-lists - stamparm/DSXS - Damn Small XSS Scanner (Python)
README
Damn Small XSS Scanner [](https://www.python.org/) [](https://wiki.creativecommons.org/wiki/Public_domain)
=========**Damn Small XSS Scanner** (DSXS) is a fully functional [Cross-site scripting](https://en.wikipedia.org/wiki/Cross-site_scripting) vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.

As of optional settings it supports HTTP proxy together with HTTP header values `User-Agent`, `Referer` and `Cookie`.
Sample runs
----```
$ python3 dsxs.py -h
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)Usage: dsxs.py [options]
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-u URL, --url=URL Target URL (e.g. "http://www.target.com/page.htm?id=1")
--data=DATA POST data (e.g. "query=test")
--cookie=COOKIE HTTP Cookie header value
--user-agent=UA HTTP User-Agent header value
--referer=REFERER HTTP Referer header value
--proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080")
``````
$ python3 dsxs.py -u "http://testphp.vulnweb.com/search.php?test=query" --data="s
earchFor=foobar"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)* scanning GET parameter 'test'
* scanning POST parameter 'searchFor'
(i) POST parameter 'searchFor' appears to be XSS vulnerable (">.xss.<", outside
of tags, no filtering)scan results: possible vulnerabilities found
``````
$ python3 dsxs.py -u "http://public-firing-range.appspot.com/address/location.has
h/replace"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)(i) page itself appears to be XSS vulnerable (DOM)
(o) ...
var payload = window.location.hash.substr(1);location.replace(payload);...
(x) no usable GET/POST parameters foundscan results: possible vulnerabilities found
```Requirements
----[Python](http://www.python.org/download/) version **3.x** is required for running this program.