Browser Browser

Сканирование

Новый скан Мониторы

Инструменты

My IP DNS Lookup WHOIS SSL Certificate Ping HTTP Headers Domain Check IP Calculator IDN Converter Reverse DNS Schema Generator TAS-IX Трассировка

Сервисы

Массовый скан Хостинг Отчёт CSEC Дефейс

Разведка

Армия AI-агентов Конкуренты Граф CVE Страхование Репутация

SEO

AI Blog GitHub SEO Site Audit Site Compare Traffic Analytics

Ещё

Все функции Документация Цены
Начать бесплатно
XSS · CONTEXT-AWARE · WAF-EVASION

Detect XSS the way
a real attacker would.

Generic XSS scanners blast a payload list and hope. Browser parses your response with multiple HTML/JS parsers, infers the exact injection context (HTML element, attribute value, JS string, JS comment…) and crafts a payload that's mathematically guaranteed to break out of that context. Plus WAF detection, evasion mode, DOM XSS and Blind XSS.

Run a free scan Read docs
Free · Authorized targets only · Reflected · DOM · Blind · WAF-evasion
×
Generic scanners
Throw <script>alert(1)</script> at every parameter. If something reflects, mark "vulnerable". Miss everything that needs context-specific escaping. Get blocked by every WAF on the planet.
Browser + XSStrike
Parse the actual response. Detect: are you inside an <a href=>? A <script> block? A JS string literal? A JS comment? Build a payload that escapes that exact context. Detect WAF, switch to evasion.
What we detect
Reflected XSS CWE-79
URL/form parameters echoed back unencoded.
DOM XSS CWE-79
innerHTML, document.write, eval sinks fed by user data.
Blind XSS CWE-79
Stored payloads that fire when admins open the data later.
WAF Bypass CWE-693
Payloads tuned for Cloudflare, AWS WAF, ModSecurity, Sucuri, Imperva.
Hidden parameters CWE-200
Forgotten debug/admin parameters that still respond.
Outdated JS libs CWE-1104
Vulnerable jQuery/Angular/React versions exposing known sinks.

How it works

01.
Crawl & map
Crawl the target up to depth 2. Discover hidden parameters via integrated Arjun-style scanning.
02.
Parse response
Run the response through multiple HTML/JS parsers. Find exactly where input lands and in what context.
03.
Detect WAF
Probe for filters and Web Application Firewalls. Switch to evasion mode if one is detected.
04.
Craft payload
Generate a payload that breaks out of the inferred context — guaranteed to execute, not just a wordlist guess.
Sample finding
Reflected XSS — context-aware payload accepted
High
param: search · efficiency: 100 · confidence: 10 · context: HTML attribute (single-quoted)
' onmouseover='confirm(/XSS/.source)'//
How to fix Encode user input on output. For HTML attribute context use &quot; / &#39; entity encoding. Set strict CSP script-src 'self' with no unsafe-inline. Ensure your templating engine has autoescape ON.

vs. other XSS scanners

Capability Browser (XSStrike) Generic scanners
Context-aware payload generation×
Multi-parser response analysis×
WAF detection & evasion×
DOM XSS scanner~
Blind XSS support×
Hidden parameter discovery×
Outdated JS library detection×
Fix recommendation per finding×

Responsible use

Ready to find every XSS hole?

One scan tells you what your WAF can't catch. Free, authorized targets only.

Start free scan →

Powered by s0md3v/XSStrike, released under GPL-3.0. Browser uses XSStrike as an external CLI tool only — no source modification. The XSStrike project is independent and unaffiliated with browser.uz.