Extension for PortSwigger Burp Suite which check and bypass XSS filters. This project was a part of Digital Security's Penetration Testing department internship "Summer of Hack 2022".
- Clone the repository:
git clone https://github.com/whoishacked/burp_xss_restriction_bypass_checker.git
-
Download Jython
-
Open Burp Suite Extender->Options tab and set Jython file location in Python Environment
-
Open Burp Suite Extender->Extensions tab and add the
xss_filter_bypass.py
extension. -
This extension uses Burp Exceptions for throwing exceptions in Python. You also need to install it using manual.
You can use payloads in Repeater. Just right-click, select payload
in Extensions->XSS Filter Bypass, send request and check response. Also, you can
insert any payload in the {XSS}
tag, for example: {XSS}this_is_my_payload{XSS}
.
If payload works - you will see the message in the response window: <!-- {XSS} -->
.
- Python
- Jython
- Burp Exceptions
- Burp Suite API
Andrew Kutuzov:
- Telegram: @andrewkutuzov