Skip to content

Automate XSS vulnerability scanning with the XSS Scanner Tool. Inject payloads, analyze responses, and save reports for easy tracking. πŸ› οΈπŸ”

Notifications You must be signed in to change notification settings

Revezor338/XSS-Scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

15 Commits
Β 
Β 

Repository files navigation

XSS Scanner: Advanced Security Tool for XSS Attacks Detection

XSS Scanner GitHub

Download Here

Overview

The XSS-Scanner is a smart tool designed to identify and report Cross-Site Scripting (XSS) vulnerabilities. With advanced payloads and detailed reporting features, it aims to help security professionals and ethical hackers effectively detect XSS issues in web applications.

Features

  • Advanced Payloads: Utilizes a variety of payloads to test for XSS vulnerabilities.
  • Detailed Reporting: Generates comprehensive reports for easy analysis.
  • User-Friendly Interface: Designed for both beginners and experienced users.
  • Open Source: Community-driven project that encourages contributions and improvements.

Installation

To install the XSS-Scanner, follow these steps:

  1. Clone the Repository:

    git clone https://github.com/Revezor338/XSS-Scanner.git
  2. Navigate to the Directory:

    cd XSS-Scanner
  3. Install Required Packages: Ensure you have Python installed. Then run:

    pip install -r requirements.txt
  4. Run the Tool: Execute the scanner with:

    python xss_scanner.py

Usage

Basic Command

To start scanning a target URL, use the following command:

python xss_scanner.py --url http://targetsite.com

Options

  • --url: Specify the target URL.
  • --payloads: Choose specific payloads to use.
  • --report: Generate a report after scanning.

Example

python xss_scanner.py --url http://example.com --report

This command scans the specified URL and generates a report of the findings.

Payloads

The scanner comes with a variety of payloads to test for XSS vulnerabilities. You can customize the payloads based on your needs. The default payloads include:

  • Basic JavaScript alerts
  • HTML injection scripts
  • Event handler injections

Adding Custom Payloads

To add your own payloads, edit the payloads.txt file in the root directory. Each payload should be on a new line.

Reporting

After scanning, the tool generates a report in the reports directory. The report includes:

  • Detected vulnerabilities
  • Payloads used
  • HTTP responses

You can view the report in any text editor or use a command like:

cat reports/report_YYYYMMDD_HHMMSS.txt

Contributing

Contributions are welcome! If you would like to contribute, please follow these steps:

  1. Fork the repository.
  2. Create a new branch:
    git checkout -b feature/YourFeature
  3. Make your changes.
  4. Commit your changes:
    git commit -m "Add your message"
  5. Push to the branch:
    git push origin feature/YourFeature
  6. Create a pull request.

Issues

If you encounter any issues or have suggestions for improvements, please open an issue in the Issues section.

Topics

This repository covers various topics in the field of security and ethical hacking. Here are some key areas:

  • Bug Bounty: Learn how to participate in bug bounty programs.
  • EroHack: A focus on ethical hacking techniques.
  • Exploit Development: Understanding how exploits work and how to develop them.
  • Penetration Testing: Techniques and tools for effective penetration testing.
  • Security Tools: A collection of tools that enhance security measures.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Resources

Support

For support, please open an issue or contact the maintainers directly.

Download Latest Release

Check the Releases section for the latest updates and downloads.

Packages

No packages published

Contributors 2

  •  
  •