XSSMAP – Detect XSS vulnerability in Web Applications


Usage mimics sqlmap, and if you know sqlmap, you can easily handle xssmap!


Easy Installation

As simple as below, Just one line of code:

curl -L https://raw.githubusercontent.com/Jewel591/xssmap/master/docs/install.sh|bash

If you get a network error, such as Connection refused, use git clone to install:

git clone -b master https://github.com/Jewel591/xssmap.git
cd xssmap
pip3 install -r requirements.txt

Usage Instructions

python3.6 xssmap.py -h


Support POST and GET request methods, support parameter injection detection in cookie, referer, useragent fields For example, test the returnUrl parameter in POST data:

python3.6 xssmap.py -u "https://example.com/login.do" --data="returnUrl=utest" -p returnUrl


  1. Support url encoding bypass
  2. Support unicode encoding of HTML tag attribute value to bypass
  3. Support HTML encoding to bypass the HTML tag attribute value
  4. Support for flexible replacement of () ‘”to bypass
  5. Case bypass


MZAP – Multiple Target ZAP Scanning

Previous article

Monsoon – Fast HTTP Enumerator

Next article

You may also like


Leave a reply

Your email address will not be published. Required fields are marked *

More in Hacking