XSSMAP - Detect XSS vulnerability in Web Applications

August 19, 2020

Detect XSS vulnerability in Web Applications

Usage mimics sqlmap, and if you know sqlmap, you can easily handle xssmap!

Easy Installation

As simple as below, Just one line of code:

curl -L https://raw.githubusercontent.com/Jewel591/xssmap/master/docs/install.sh|bash

If you get a network error, such as Connection refused, use git clone to install:

git clone -b master https://github.com/Jewel591/xssmap.git
cd xssmap
pip3 install -r requirements.txt

Usage Instructions

python3.6 xssmap.py -h

Support POST and GET request methods, support parameter injection detection in a cookie, referer, useragent fields. For example, test the returnUrl parameter in POST data:

python3.6 xssmap.py -u "https://example.com/login.do" --data="returnUrl=utest" -p returnUrl


  1. Support URL encoding bypass
  2. Support unicode encoding of HTML tag attribute value to bypass
  3. Support HTML encoding to bypass the HTML tag attribute value
  4. Support for flexible replacement of () '" to bypass
  5. Case bypass


Contributions, issues and feature requests are welcome!

Feel to check issues page

thanks for @dwisiswant0




  • DOM XSS Detect
  • Json XSS Detect


MIT © Jewel591, Kyle

More: https://github.com/Jewel591/xssmap

Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.