A simple GitHub Pages-hosted tool for testing and demonstrating stored and reflected XSS vulnerabilities using various payloads.
A simple XSS payload host for testing and demonstrating stored/reflected XSS using GitHub Pages. Useful for bug bounty & security research.
This tool is designed for bug bounty hunters and security researchers to easily test and demonstrate Cross-Site Scripting (XSS) vulnerabilities in web applications. It provides a quick setup environment to inject and observe the effects of different XSS payloads, aiding in vulnerability identification and security training.
This tool is intended for educational and authorized security testing purposes only. Users should ensure they have permission before testing any web application to avoid legal issues. Since it uses GitHub Pages, deployment is straightforward but limited to static content hosting.
Clone the repository: git clone https://github.com/turrab1349/xss-test.git
Navigate to the cloned directory: cd xss-test
Open the index.html file in a web browser to view the project
git clone https://github.com/turrab1349/xss-test.git
Clones the repository to your local machine
cd xss-test
Changes directory to the cloned repository
Open index.html in a browser
Launches the demo page to test XSS payloads
Inject payloads like <script>alert('XSS');</script> into input fields
Tests how the application handles and reflects XSS payloads