From 4ef6aae880afacf7ed810de346004c90617076a2 Mon Sep 17 00:00:00 2001
From: Max Yaremchuk <38838852+w9w@users.noreply.github.com>
Date: Fri, 28 Feb 2025 02:10:50 -0800
Subject: [PATCH] Update xss.py
99% of WAFs will block the requests with default payloads. I suggest checking for
to detect a basic HTML injection and then act accordingly if found.
---
xss.py | 1 +
1 file changed, 1 insertion(+)
diff --git a/xss.py b/xss.py
index 0fedc8c..a47daa6 100755
--- a/xss.py
+++ b/xss.py
@@ -305,6 +305,7 @@ def realDoTest( t_params ):
# source: https://twitter.com/brutelogic/status/1138805808328839170
if not n_payloads:
t_payloads = [
+ '
',
'\'"-->.',
'\'"-->',
'\'"-->