Skip to content

pangeran-droid/xsscan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

XSS Scanner Logo

XSS Scanner (Playwright-Based)

Python Version Playwright License Repo Size Stars


A modern Playwright-based XSS Scanner designed for bug bounty hunters and security researchers.

This tool performs real browser–based XSS detection through crawling, URL parameter injection, and smart form submission.

This Playwright-based XSS scanner is designed for bug bounty hunters and penetration testers to detect real-world executed cross-site scripting vulnerabilities.

Focused on XSS that is actually EXECUTED, not just reflected strings.


Example XSS detection result


Features

  • Real browser execution (Playwright + Chromium)
  • URL parameter XSS scanning
  • Multi-form XSS scanning
  • Smart form submission (auto bypass required / validation fields)
  • JavaScript dialog detection (alert, prompt)
  • Recursive crawling (same domain only)
  • Auto XSS report generation (.ndjson)
  • Clean & readable CLI colored output
  • Marker-based validation to avoid false positives

How It Works (High Level)

  1. Crawl target website (same domain)
  2. Detect URL parameters
  3. Inject XSS payloads
  4. Detect JavaScript dialogs (alert, prompt)
  5. Parse & submit all forms intelligently
  6. Fallback to raw form submission if smart submit fails
  7. Save confirmed executed XSS to report file

Only EXECUTED XSS will be reported.


Requirements

  • Python 3.8+
  • Playwright
  • Chromium browser (installed via Playwright)

Installation

git clone https://github.com/pangeran-droid/xsscan.git
cd xsscan
pip install -r requirements.txt
playwright install chromium

Usage

python3 xsscan.py -u https://target.com

Options

Flag Description Default
-u Target URL required
-d Crawl depth 2

Payload Examples

Each scan generates a unique marker using a random numeric value.
The marker is injected into XSS payloads and verified upon execution.

"><svg/onload=alert({marker})>
"><img src=x onerror=prompt({marker})>
<script>alert({marker})</script>

Output Example

[*] Crawling (0) → https://target.com
[*] Form #1 → /search (GET)
[🔥 XSS] EXECUTED at https://target.com/search?q=...

Report File

Confirmed XSS findings will be saved automatically to:

xss_report.ndjson

Example entry:

{"url":"https://target.com","marker":"1337123456","message":"1337123456"}

⚠️ Disclaimer

This tool is created for educational purposes and authorized security testing only.
❌ Do NOT use this tool against targets without explicit permission.

The author is not responsible for any misuse or illegal activities.

About

Modern Playwright-based XSS scanner for bug bounty hunters and security researchers, focused on detecting real executed XSS via browser automation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages