xss0r Diamond Plan

$89.99
every 3 months
BUY NOW
4.9
 (
5
)
Crypto payments soon...
xss0r heading logo

The DIAMOND PLAN is tailored for advanced users looking to master complex XSS security testing with an extensive toolset. It includes essential features like GET and POST requests with cookie support, PATH request handling, and access to 3,000 XSS payloads with full WAF bypass capabilities and unlimited custom payload loading. Advanced features such as BlindXSS, Reflection Checker, Alert-Only Notifications, and support for JSON and Multipart WebApps provide flexibility in vulnerability detection. Additional tools like fuzzing, crawling, resume scan functionality, limit requests, and CSP bypass elevate your testing capabilities. With a thread speed limit of up to 13, plus technical support, an eBook with examples, and instructional videos, the DIAMOND PLAN provides comprehensive support. This plan allows 1 license, usable on up to 4 devices across 2 IP addresses.

Complete Features Overview

Get / Post:
Run comprehensive vulnerabilitytests using both GET and POST methods.

Onlyalerts:
Display only triggeredalerts, keeping scan outputs clean and focused.

Recon:
Full reconnaissance includingdomain enumeration, crawling, and smart discovery.

Path:
Inject payloads into URL pathsegments to uncover path-based vulnerabilities.

Cookies & Initialize:
Load cookiesand initialize authenticated sessions for scanning protected areas.

Reflection:
Test for reflection pointsto identify potential XSS targets.

Prefix / Suffix:
Prepend or appendcustom strings to payloads, helping bypass input filters.

Blindusername:
Inject your xss0r.comusername into User-Agent for BlindXSS detection and tracking.

Crawler:
Crawl internal links deeply,expanding the attack surface automatically.

Limit:
Control requests per minute toavoid WAF blocking or rate limits.

Save / Resume:
Save scanning sessionsand resume them later without losing progress.

CRLF Injection:
Detect CRLF injectionvulnerabilities across subdomains and parameters.

Inspector:
Advanced inspection touncover hidden or passive endpoints.

Stealth:
Run with low, medium, or highstealth modes to bypass advanced WAFs.

Spray (BlindXSS):
Use sprayingtechniques to find stored and deferred XSS vulnerabilities.

Fuzzer:
Fuzz reflections to identify howcharacters are filtered, blocked, or encoded.

Clickme:
Simulate mouse clicks andkeyboard events to trigger hidden DOM XSS vectors.

Fullscan:
Force testing against theentire payload library, maximizing vulnerabilitycoverage.

Threads:
Supports 13 parallelthreads for high-performance scanning.

Payloads:
Dynamic payload handling(listed as n/a for virtually unlimited orauto-optimized).

⚠ License Details:

  • License: 1 User
  • Devices: Supports up to 4 devices on 2 different IP addresses

😊❤️ Hear from Our Happy Customers! 😊❤️

🚀 Don't just take our word for it! Explore the authentic experiences of our amazing community who have worked with us. Their honest reviews and feedback speak volumes about the accuracy of the xss0r Tool, with zero false positives. We can't wait for you to see it—check out the images below! 📸✨

4.9/5 (264)

Frequently Asked Questions

What is an XSS tool, and why do penetration testers utilize it?

An XSS tool is designed to identify Cross-Site Scripting vulnerabilities in web applications. Penetration testers employ these tools to detect security weaknesses that may enable attackers to inject malicious code, thereby enhancing the overall security posture of web applications.

What types of XSS vulnerabilities does the tool detect?

Our tool detects a range of XSS vulnerabilities, including reflected, stored, DOM-based, path-based, blind XSS, as well as vulnerabilities in both GET and POST requests.

How do I customize the payloads?

Our user-friendly interface enables you to effortlessly modify existing payloads or create custom payloads tailored to specific testing scenarios.

Are there any new improvements for WAF bypass?

Yes! We’ve made significant improvements:
+300 new payloads have been added to every plan.
Golden and Business plans now include
500+ new payloads, covering a wide variety of WAFs.
New Fuzzing Feature: This feature performs static analysis based on page source reflection and allowed characters. It generates and automates payloads intelligently, using only the characters allowed by the target application.
Clickable Payloads: xss0r V3 introduces a feature for payloads requiring user interaction, such as <ClickME> buttons. The tool automatically performs POST requests with these payloads, clicks on them, and completes all actions on your behalf.

Is there a trial version available?

Yes, we offer a DEMO service that clients can request at any time, allowing for a 5-day testing period. Additionally, we provide a free access key for new users on the 10th to 15th of every month, enabling them to test the tool before making a purchase, specifically for the PRO plan.

Can xss0r analyze JSON web applications?

Yes, xss0r supports JSON web applications, allowing for detailed testing of JSON payloads and data structures.

What are the advanced search and filter options in xss0r?

xss0r offers advanced search and filter capabilities, allowing users to quickly locate specific vulnerabilities and tailor their testing approach.

What is Blind XSS, and how is it implemented in xss0r?

xss0r now includes Blind XSS functionality, allowing automated testing of reflected vulnerabilities over time. It sends payloads to trigger XSS even in delayed interactions.

Does xss0r V3 support macOS and other Linux distributions?

Yes! xss0r fully supports macOS, Ubuntu (latest version), and is compatible with all Linux platforms.

How does the new crawler feature enhance testing?

The built-in crawler searches through HTML, XML, and JS tags to discover URLs. It also identifies input forms, such as usernames, feedback, and comment fields, and can automatically submit Blind XSS payloads using the new --spray feature.

Where is the API key sent, and how can I add my API key?

When purchasing any XSS Plan, please use a valid email address during registration. API access will be provided within 6 to 12 hours after purchase, though it often arrives sooner. The xss0r tool will be accessible after purchasing a plan, and the API key will be sent to the registered email. If you do not receive your API access within 12 hours, please reach out directly through Support Chat or X.

What are the complete features of BlindXSS in xss0r?

Blind XSS in xss0r now offers automatic crawling of forms onwebsites, spraying Blind XSS payloads, and saving any triggeredpayloads directly to your account with Telegram notifications. Italso supports injection of Blind XSS payloads in the user-agentheader, capturing all discovered links for manual inspection.Email-specific payloads target only email fields, and Blind XSSdorking has been added for deeper exploration. Additionally, testpages are provided for learning and practicing Blind XSS techniques.Telegram and Email Notifications Event Payloads for Account Takeover New Features:
All Cookies (Non-HttpOnly): Collects all accessible cookies that are not flagged as HttpOnly for analysis and debugging. Referrer Information: Retrieves the referring URL to identify the source of traffic to the page.
IP Address of the Target Client: Captures the public IP address and provides approximate location details, including city, region, and country.
Browser Language Information: Detects the browser's language settings to support localization and customization.
Browser Name and Version: Identifies the browser name and version using the User-Agent string.
Screenshot of DOM Structure: Generates a visual screenshot of the current DOM structure for debugging and reporting purposes. Screen Resolution: Collects the screen resolution and window size of the client’s device.
Graphics Card Information: Retrieves detailed GPU information, including vendor and renderer.
Battery Status: Tracks the device’s battery level and charging status when supported by the browser.
Network Information: Captures the network type (e.g., Wi-Fi, 4G) and downlink speed. Local Storage and Session Storage: Extracts data stored in the client’s local and session storage.
Form Inputs: Collects values from all form inputs, including text fields, text areas, and dropdowns, on the page.
Page Metadata: Gathers essential page metadata, including the page title, URL, and full HTML structure.
Plugins and Mime Types: Retrieves a list of installed browser plugins and supported MIME types.
Admin Panel Accessibility Check: Attempts to access the /admin endpoint to verify if it is accessible and logs the response status.
API Key Discovery in Scripts: Scans all script files loaded on the page to identify potential API keys in their content.