A simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables in the global context) to perform XSS via Prototype Pollution. NOTE: The program only exploits known gadgets, but does not cover code analysis or any advanced Prototype Pollution exploitation, which may include custom gadgets.
Make sure to have chromedp installed:
go get -u github.com/chromedp/chromedp
chmod +x ppmap
Manually (compile it yourself)
Clone the project:
git clone https://github.com/kleiton0x00/ppmap.git
go build ppmap.go
Using the program is very simple, you can either:
scan a directory/file (or even just the website):
echo 'https://target.com/index.html' | ./ppmap
echo 'http://target.com/something/?page=home' | ./ppmap
For mass scanning:
cat url.txt | ./ppmap where url.txt contains all url(s) in column.
Many thanks to @Tomnomnom for the inspiration: https://www.youtube.com/watch?v=Gv1nK6Wj8qM&t=1558s