xss-scanner
Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. It's intended use is to help "plug" the vulnerability, not exploit. Be nice. Make the web better.
The three most important countermeasures to prevent cross-site scripting attacks are to:
- Constrain input.
- Encode output.
- Filter user input.
Url encode output URLs if they are constructed from input.
Html encode output if it contains input from the user or from other sources such as databases.
Cross platform - macOS, Linux, and Windows. It's also working my Raspberry Pi 3 Model B.
Installation
npm install
Configuration
Open up the config.js file and configure the xssOptions() return object.
Run
npm start
Results
The console shows the XSS parameter values that have made it back with a status code 200. You can also dump the resulting Html to a file. Unfortunately, you have to manually check these. I prefer to use the latest version of Firefox with add-ons and extensions disabled. Other XSS tools, such as Burp Suite, also require some manual checking.
At the top of the Html content, look for a <![CDATA[ \"-alert(123456789))// ]]>. It contains the offending XSS injection payload value.

Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.
