REFLECTOR Burp Suite Plugin: Find Reflected XSS on Page in Real-time

REFLECTOR v1.0 Burp Suite extension is able to find reflected XSS on the page in real-time while browsing on the website and inclu...


Burp Suite extension is able to find reflected XSS on the page in real-time while browsing on the website and include some features as:
  • Highlighting of reflection in the response tab.
  • Test which symbols is allowed in this reflection.
  • Analyze of reflection context.
  • Content-Type whitelist.


After plugin install you just need to start work with the tested web-application. Every time when reflection is found, reflector defines severity and generates burp issue. 

Each burp issue includes detailed info about the reflected parameter, such as:

  • Symbols that allowed in this reflection.
  • Highlighting of reflection value in response.
  • Reflection context analyze.

Allowed Sybmols Analyse

When the reflection is found an option "Aggressive mode" is activated, the reflector will check which of special-symbols are displayed on this page from vulnerable parameters. For this action, reflector composes additional requests for each reflected parameter. In the example, while he was working with elkokc.ml website reflector is generated issue with a detailed information about reflection. There are 3 reflections for "search" parameter and each of them pass special symbols. Because of the possibility of displaying special characters issue severity is marked as high. Every time when reflection is found reflector define severity and generate burp issue.

Context Analyse

In the "Check context" mode reflector it does not only show special characters that are reflected the page but also figure out a character that allows breaking the syntax in the page code. In the example, you may see server response by reflector extension. Parameter "search" was sent with a payload - p@y<"'p@y. As a result, it was reflected a few times in different contexts.

  • reflection with next characters - ',", < and the double quote allow to exit from this context and write HTML code.
  • reflection with next characters - ", < and the bracket allow to inject HTML-tags.
  • reflection with next characters - ',", < and the single quote allow to exit from js variable context and write malicious code.

In the issue information it's marked as:

  • Context char - a character that allows breaking the syntax.
  • Other chars - other chars that are reflected without context. 

Reflection Navigation

Navigation by arrow buttons in the response tab.


  • Scope only - allow reflector to work only with a scope added websites.
  • Aggressive mode - reflector generates an additional request with a test payload.
  • Check context - activate check context mode.

Moreover, you can manage content-types whitelist with which reflector plugin should work. But if you will use another type except for text/HTML, this can lead to slowdowns in work.

Respected Authors

Shvetsov Alexandr
Dimitrenko Egor

Important Notice

For Educational and Informational Purposes Only.

The information contained in our Website, Programs, and Services is for educational and informational purposes only and is made available to you as self-help tools for your own use. I am not responsible for any kind of damage hardware and software and not liable for any kind of unethical activity.

AEPD,1,Amazon,1,Amazon Web Service,1,Apple,2,Auditing,2,AWS,1,BaRMIe,1,Bitcoin,1,Books,1,Brup Suite Plugin,1,Bug Hunting,1,Burp Suite,1,Chrome,1,Cloudflare,1,Crackas With Attitude,1,CSRF,1,CVE,1,Cyber Attack,2,Cyber Crime,5,Cyber Espionage,1,Cyber Experts,2,cybercriminals,1,CyberScan,1,D-Link,1,Dark Web Market,1,Data Breach,2,Deep Web,1,DumpsterFire Toolset,1,EllaScanner,1,Elmedia Player,1,Eltima,1,Enumeration Tool,1,ESET,1,Exploit Pack,1,Exploiting,4,Facebook,1,Firewall,1,Github,1,Google,4,Google Play Security Reward Program,1,Google Play Store,1,GPS,1,HackerOne,1,Hackers,1,Information Gathering,1,Internet Privacy,1,Kali Linux,1,Linux,5,Mac,2,Mac OS X,2,Malware,1,Microsoft,1,NCA,1,News,10,OWASP,1,Pentesting,2,Pentesting Framework,2,Privilege Escalation,1,Proton,1,Python Keylogger,1,Reflector,1,Reptile,1,Rootkit,1,Scam,1,Scanner,2,Seccubus,1,Security,3,Smartwatch,1,Surveillance,1,Symantec,1,theHarvester,1,Tools,17,UK Government,1,US Intelligence,1,VHostScan,1,Vulnerability,4,WAF,1,Whole Foods Market Breached,1,Windows,4,XSS,1,ZAP,1,Zero-Day,1,
Exploitable — Cyber Security News & Hacking Tools: REFLECTOR Burp Suite Plugin: Find Reflected XSS on Page in Real-time
REFLECTOR Burp Suite Plugin: Find Reflected XSS on Page in Real-time
Exploitable — Cyber Security News & Hacking Tools
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy