{"id":12056,"date":"2021-01-08T20:46:12","date_gmt":"2021-01-08T15:16:12","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=12056"},"modified":"2021-01-08T20:46:12","modified_gmt":"2021-01-08T15:16:12","slug":"xss-scanner","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/","title":{"rendered":"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities In Website"},"content":{"rendered":"\n<p><strong>XSS-Scanner<\/strong> is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP Top 10 project and it is a highly chased vulnerability in bug bounty programs.<\/p>\n\n\n\n<p>The scanner gets a link from the user and scan the website for XSS vulnerability by injecting malicious scripts at the input place. The injection happens in headless browser named Chromium and controlled by Puppeteer automation.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>It works in two steps:<\/strong><ul><li><strong>Find the target:<\/strong> In this first step, the tool tries to identify all the places at the page including injectable parameters in forms, URLs, headers, etc.<\/li><li><strong>Test for XSS:<\/strong> For each place discovered in the previous step, the scanner will try to detect if the parameters are vulnerable to Cross-Site Scripting. The tool injects a piece of JavaScript code, including some special HTML characters (&gt;, &lt;, &#8220;, &#8216;) and it will try to see if they are returned in the response page without sanitization. If the tool detects at least one vulnerability, it will return that the website have XSS vulnerability.<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Technologies<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Puppeteer<\/li><li>Javascript<\/li><li>NodeJS<\/li><li>Express<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>How to install?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Clone the repository:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/MariaGarber\/XSS-Scanner.git <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Enter the clonned folder:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>cd XSS-Scanner <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Install the dependencies:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>npm install <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Run the application:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>npm start <\/strong><\/p>\n\n\n\n<p>Open the browser at <a href=\"http:\/\/localhost:4000\/\">http:\/\/localhost:4000\/<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP Top 10 project and it is a highly chased vulnerability in bug bounty programs. The scanner gets a link from the user and scan the website for XSS vulnerability by [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16649,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png","fifu_image_alt":"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities In Website","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2972,3560,3848],"class_list":["post-12056","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-scripting","tag-vulnerabilities","tag-xss-scanner-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities<\/title>\n<meta name=\"description\" content=\"XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-08T15:16:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities In Website\",\"datePublished\":\"2021-01-08T15:16:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/\"},\"wordCount\":229,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png\",\"keywords\":[\"Scripting\",\"Vulnerabilities\",\"XSS-Scanner\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/\",\"name\":\"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png\",\"datePublished\":\"2021-01-08T15:16:12+00:00\",\"description\":\"XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities","description":"XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/","og_locale":"en_US","og_type":"article","og_title":"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities","og_description":"XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter","og_url":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-01-08T15:16:12+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities In Website","datePublished":"2021-01-08T15:16:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/"},"wordCount":229,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png","keywords":["Scripting","Vulnerabilities","XSS-Scanner"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/","url":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/","name":"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png","datePublished":"2021-01-08T15:16:12+00:00","description":"XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/xss-scanner\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-HW1LZ3HVAOU\/X_WdI63KvFI\/AAAAAAAAIRY\/JVda3SFpbXYv4LKzl95z1e3G5gil3ixkgCLcBGAsYHQ\/s728\/xss_scanner%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4618,"url":"https:\/\/kalilinuxtutorials.com\/xsstrike-xss-scanner\/","url_meta":{"origin":12056,"position":0},"title":"XSStrike : Most Advanced XSS Scanner","author":"R K","date":"April 15, 2019","format":false,"excerpt":"XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler. Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1765,"url":"https:\/\/kalilinuxtutorials.com\/xsspy-web-application\/","url_meta":{"origin":12056,"position":1},"title":"XssPy &#8211; Web Application XSS Scanner","author":"R K","date":"June 27, 2018","format":false,"excerpt":"XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon's Bug Bounty Program. Also Read\u00a0CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities Installation XssPy Type the following in the terminal. git clone https:\/\/github.com\/faizann24\/XssPy\/ \/opt\/xsspy The\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"https:\/\/github.com\/faizann24\/XssPy","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":28872,"url":"https:\/\/kalilinuxtutorials.com\/xss-automation\/","url_meta":{"origin":12056,"position":2},"title":"XSS Automation &#8211; Tool to Identify and Exploit cross-site scripting (XSS) Vulnerabilities","author":"Linumonk","date":"April 11, 2023","format":false,"excerpt":"The XSS-Scanner is a tool designed to detect cross-site scripting (XSS) vulnerabilities, widely recognized as among the most common and severe web application security weaknesses. These vulnerabilities are so significant that they are given their chapter in the OWASP Top 10 project and are actively sought after by many bug\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"XSS Automation","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNnJe1ympybrsW3ER17qkUjwcvYEjEH_bFbmsNCHOKCHZIjt8xBXDYUlNBXli-YU3jjbldqHT3EdfYK4gSHh_KsxJ44XpuW6DMS1zeUaZWS9d9HtVMk5XjaX7nK_HOzWmQvnmGh-afgPr7Co6w9nt9GEMjNeveourDlxBLz30R4OvlPRK1s5Wgs67OVw\/s16000\/XSS%20Automation%20Tool.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNnJe1ympybrsW3ER17qkUjwcvYEjEH_bFbmsNCHOKCHZIjt8xBXDYUlNBXli-YU3jjbldqHT3EdfYK4gSHh_KsxJ44XpuW6DMS1zeUaZWS9d9HtVMk5XjaX7nK_HOzWmQvnmGh-afgPr7Co6w9nt9GEMjNeveourDlxBLz30R4OvlPRK1s5Wgs67OVw\/s16000\/XSS%20Automation%20Tool.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNnJe1ympybrsW3ER17qkUjwcvYEjEH_bFbmsNCHOKCHZIjt8xBXDYUlNBXli-YU3jjbldqHT3EdfYK4gSHh_KsxJ44XpuW6DMS1zeUaZWS9d9HtVMk5XjaX7nK_HOzWmQvnmGh-afgPr7Co6w9nt9GEMjNeveourDlxBLz30R4OvlPRK1s5Wgs67OVw\/s16000\/XSS%20Automation%20Tool.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNnJe1ympybrsW3ER17qkUjwcvYEjEH_bFbmsNCHOKCHZIjt8xBXDYUlNBXli-YU3jjbldqHT3EdfYK4gSHh_KsxJ44XpuW6DMS1zeUaZWS9d9HtVMk5XjaX7nK_HOzWmQvnmGh-afgPr7Co6w9nt9GEMjNeveourDlxBLz30R4OvlPRK1s5Wgs67OVw\/s16000\/XSS%20Automation%20Tool.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6898,"url":"https:\/\/kalilinuxtutorials.com\/traxss-automated-xss-vulnerability-scanner\/","url_meta":{"origin":12056,"position":3},"title":"Traxss : Automated XSS Vulnerability Scanner","author":"R K","date":"October 16, 2019","format":false,"excerpt":"Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test with and multiple options for robustness of tests. View the gif above to see a preview of the fastest type of scan. Getting Started Prerequisites Traxss depends on Chromedriver. On\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10659,"url":"https:\/\/kalilinuxtutorials.com\/web-hackers-weapons\/","url_meta":{"origin":12056,"position":4},"title":"Web Hacker&#8217;s Weapons : Collection Of Cool Tools Used By Web Hackers","author":"R K","date":"May 29, 2020","format":false,"excerpt":"Web Hacker's Weapons is a collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting. Weapons Army-Knife\/ALLBurpSuitethe BurpSuite projectArmy-Knife\/SCANjaelesThe Swiss Army knife for automated Web Application TestingArmy-Knife\/ALLzaproxyThe OWASP ZAP core projectDiscovery\/ALLOneForAllOneForAll\u662f\u4e00\u6b3e\u529f\u80fd\u5f3a\u5927\u7684\u5b50\u57df\u6536\u96c6\u5de5\u5177Discovery\/ALLaquatoneA Tool for Domain FlyoversDiscovery\/ALLlazyreconThis script is intended to automate your reconnaissance process in an organized fashionDiscovery\/CRAWLPhotonIncredibly\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36955,"url":"https:\/\/kalilinuxtutorials.com\/the-xss-rat\/","url_meta":{"origin":12056,"position":5},"title":"The-XSS-Rat : A Comprehensive Guide To Cross-Site Scripting Tools And Strategies","author":"Varshini","date":"March 10, 2025","format":false,"excerpt":"The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS) through comprehensive guides and strategies. This article will delve into the tools and techniques used by The-XSS-Rat to identify and exploit XSS vulnerabilities. Understanding XSS XSS is a cyberattack method where malicious code is executed\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/The-XSS-Rat-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/The-XSS-Rat-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/The-XSS-Rat-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/The-XSS-Rat-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/The-XSS-Rat-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/The-XSS-Rat-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=12056"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12056\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16649"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=12056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=12056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=12056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}