Ppmap – A Scanner/Exploitation Tool Written In GO, Which Leverages Prototype Pollution To XSS By Exploiting Known Gadgets

A simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables in the global context) to perform XSS via Prototype Pollution. NOTE: The program only exploits known gadgets, but does not cover code analysis or any advanced Prototype Pollution exploitation, which may include custom gadgets.


Make sure to have chromedp installed:
go get -u


  • Automatically

    • Download the already compiled binary here
    • Give it the permission to execute chmod +x ppmap
  • Manually (compile it yourself)

    • Clone the project:
      git clone
    • Change directory to ppmap folder:
      cd ~/ppmap
    • Build the binary
      go build ppmap.go


Using the program is very simple, you can either:

  • scan a directory/file (or even just the website): echo '' | ./ppmap

  • or endpoint: echo '' | ./ppmap

For mass scanning:
cat url.txt | ./ppmap where url.txt contains all url(s) in column.


Feel free to test the tool on the following websites as a part of demonstration:


  • Identify if the website is vulnerable to Prototype Pollution by heuristic scan
  • Fingerprint the known gadgets (checks for specific variables in the global context)
  • Display the final exploit & ready to perform XSS


Many thanks to @Tomnomnom for the inspiration:
The workflow of this program is hugely based on this article:
The fingerprint javascript file is based on this git:

Related Articles

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Back to top button