XSS cheatsheet for filter evasion by RSnake. This page is for those who understand the basics of XSS but want a deep understanding of filter evasion nuances. It provides underlying attack vectors without mitigation techniques or actual cookie/credential stealing methods.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Emulates browser functionality to detect exploits targeting browser vulnerabilities.
Threatspy is an application security testing platform that enables developers and security teams to discover, analyze, prioritize, and remediate vulnerabilities in web applications and APIs through an automated end-to-end process.
Falco is a cloud native runtime security tool for Linux operating systems that detects and alerts on abnormal behavior and potential security threats in real-time.
A plugin for viewing, detecting weak configurations, and generating Content Security Policy headers.
XSS Polyglot Challenge - XSS payload running in multiple contexts for testing XSS.
Application security platform that combines SAST and SCA with runtime intelligence to validate vulnerability exploitability and provide contextual remediation guidance.
A web-based tool for instrumenting and analyzing Android applications using Flask, Jinja, and Redis.
Automatic tool for pentesting XSS attacks against different applications
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.