Skip to content
forked from dr34mhacks/XSSNow

Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.

License

Notifications You must be signed in to change notification settings

Sec-Fork/XSSNow

 
 

Repository files navigation

🥷 XSSNow - The Ultimate XSS Arsenal

XSSNow Logo

Live Demo License: MIT Contributions Welcome

XSSNow is a community-driven, curated knowledge base of Cross-Site Scripting (XSS) payloads, designed to help security researchers, bug bounty hunters, and learners quickly find relevant, real-world payloads for different XSS scenarios.


🎯 The Problem We're Solving

Cross-Site Scripting (XSS) vulnerabilities remain one of the most prevalent security threats in modern web applications. Security researchers, penetration testers, and bug bounty hunters face constant challenges:

  • Scattered Knowledge - XSS payloads are buried across blogs, forums, and personal notes
  • Context Confusion - Not knowing which payload works in specific injection contexts
  • Defense Evolution - Modern WAFs and filters require increasingly sophisticated bypass techniques
  • Learning Curve - Beginners struggle to understand why certain payloads work while others fail
  • Time Pressure - Security testing demands quick access to relevant, working payloads

🚀 Our Solution

XSSNow transforms the chaotic landscape of XSS exploitation into a structured, intelligent arsenal. We've built more than just a payload database - we've created an ecosystem that understands context, evolves with defenses, and accelerates discovery.

🧠 Intelligent Payload Organization

  • Context-Aware Categorization - Payloads organized by injection context, not just syntax
  • Defense-Focused Grouping - Specific collections for WAF bypasses, encoding evasions, and filter circumvention
  • Difficulty Progression - From beginner-friendly basics to expert-level polyglots
  • Real-World Testing - Every payload validated against actual applications and defense mechanisms

Advanced Payload Generation

  • Smart Context Detection - Understands where your injection point sits in the application flow
  • Restriction-Aware Suggestions - Adapts to character limitations, encoding constraints, and input filters
  • WAF-Specific Optimization - Tailored bypass techniques for major firewall vendors
  • Custom Length Optimization - Generates payloads within strict character limits

🛡️ Modern Defense Awareness

  • CSP Bypass Techniques - Navigate Content Security Policy restrictions with confidence
  • Encoding Evasion - Break through HTML entity encoding, URL encoding, and custom sanitizers
  • Filter Circumvention - Proven methods to bypass keyword blacklists and regex filters
  • Browser Quirks - Leverage parser differences across modern browser engines

🔥 What Makes XSSNow Different

Traditional Approach XSSNow Advantage
Static payload lists Dynamic, context-aware generation
Generic collections Defense-specific categorization
Copy-paste mentality Educational understanding
Outdated techniques Real-time effectiveness tracking
Isolated research Community-driven validation

🌐 Instant Access

Visit xssnow.in and start exploring immediately. No installation required.


📋 Payload Categories

🎯 Context-Based Classification

  • HTML Injection - Direct markup insertion and tag manipulation
  • Attribute Breaking - Escaping from HTML attributes and event handlers
  • JavaScript Context - String breaking and code execution within JS
  • CSS Injection - Style-based attacks and expression exploitation
  • URL Parameters - Query string and fragment-based vectors

🛡️ Defense-Focused Collections

  • WAF Bypasses - Techniques for major firewall vendors
  • Encoding Evasions - Character set manipulation and obfuscation
  • Filter Circumvention - Keyword blacklist and regex bypass
  • CSP Violations - Content Security Policy escape techniques
  • Polyglot Attacks - Multi-context universal payloads

🤝 Join the Revolution

XSSNow thrives on community collaboration. Whether you're discovering new bypass techniques, improving existing payloads, or sharing knowledge - your contributions drive the platform forward.

💡 Ways to Contribute

  • Submit Payloads - Share your latest discoveries and bypass techniques
  • Improve Documentation - Help others understand complex attack vectors
  • Test Effectiveness - Validate payloads against real-world applications
  • Share Knowledge - Write tutorials and educational content
  • Report Issues - Help us maintain platform quality

→ Read our Contributing Guidelines


⚠️ Responsible Security Research

Do NOT use these payloads on systems you do not own or have explicit permission to test.


📄 License

Licensed under the MIT License - empowering open security research while maintaining responsible usage standards.


Built with ❤️ by Sid Joshi (@dr34mhacks)

If XSS helped you once, XSSNow is here to help you every time. 🛡️

Visit XSSNow Star on GitHub

About

Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 37.5%
  • CSS 32.2%
  • HTML 30.3%