XSS Payload Detector
Detect XSS (Cross-Site Scripting) attack vectors in input strings
### XSS Payload Detector
This tool helps identify potential XSS vulnerabilities in your input:
**Detection Categories:**
- **Script Tags**: <script>, </script>, <script.*?>
- **Event Handlers**: onclick, onload, onerror, onmouseover, etc.
- **Dangerous Protocols**: javascript:, vbscript:, data:
- **iframe/frame**: <iframe>, <frame>
- **Object/Embed**: <object>, <embed>
- **Style Injection**: <style>, expression(), -moz-binding
- **SVG-based XSS**: <svg> tags with event handlers
- **DOM-based XSS**: innerHTML, eval(), document.write()
**Risk Levels:**
- **LOW**: Basic HTML tags without scripts
- **MEDIUM**: Event handlers and protocols
- **HIGH**: Script tags and encoded payloads
- **CRITICAL**: Complete, executable XSS payloads
**Example Attack Patterns:**
- <script>alert('XSS')</script>
- <img src=x onerror=alert('XSS')>
- <svg onload=alert('XSS')>
- javascript:alert('XSS')
- <iframe src="javascript:alert('XSS')">
- %3Cscript%3Ealert('XSS')%3C/script%3E
**Use Cases:**
- Validate user input before rendering
- Scan log files for XSS attempts
- Review code for potential vulnerabilities
- Security testing and penetration testing
- Educational tool for learning XSS attacks
API Documentation
Request Endpoint
POST /en/api/tools/xss-payload-detector
Request Parameters
| Parameter Name | Type | Required | Description |
|---|---|---|---|
| text | textarea | Yes | - |
| checkEventHandlers | checkbox | No | Detect onclick, onload, onerror, and other event handlers |
| checkScriptTags | checkbox | No | Detect |