CheckXSS – Detect XSS vulnerability in Web Applications

Detect XSS vulnerability in Web Applications
Screenshots

Easy Installation
As simple as below, Just one line of code:
curl -L -s https://raw.githubusercontent.com/Jewel591/CheckXSS/master/docs/install.sh|bash
Usage Instructionspython3.6 checkxss.py -h

Support POST and GET request methods, support parameter injection detection in cookie, referer, useragent fields For example, test the returnUrl parameter in POST data:python3.6 checkxss.py -u "https://example.com/login.do" --data="returnUrl=utest" -p returnUrl

Features
- Support url encoding bypass
- Support unicode encoding of HTML tag attribute value to bypass
- Support HTML encoding to bypass the HTML tag attribute value
- Support for flexible replacement of () ‘”to bypass
- Case bypass
Contributing
Contributions, issues and feature requests are welcome!
Feel to check issues page
Maintainers
@Jewel591
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.