trufflesecurity / xsshunter

MIT License
342 stars 97 forks source link

Accept query params for the script src and reflect them on the report #49

Open KarahanGuner opened 11 months ago

KarahanGuner commented 11 months ago

While using the XSS Hunter hosted by Trufflesecurity, if a person injects 20 payloads to a website in different locations and one of them is fired, it is not possible to know which payload worked. My idea is to having the option to add query parameters to js.rip url. The user can add comments to each payload using the query params.

Example: https://js.rip/yourrandomstring?location=contactformuserinput . Then, the location parameter would be reflected in the report, giving the user description of vulnerable endpoint.