Open
Description
While using the XSS Hunter hosted by Trufflesecurity, if a person injects 20 payloads to a website in different locations and one of them is fired, it is not possible to know which payload worked. My idea is to having the option to add query parameters to js.rip url. The user can add comments to each payload using the query params.
Example: https://js.rip/yourrandomstring?location=contactformuserinput . Then, the location parameter would be reflected in the report, giving the user description of vulnerable endpoint.