Bridging the gap between identifying a flaw and demonstrating its real-world risk can be challenging. The open-source project evilreplay provides a powerful, specialized utility that helps security practitioners effectively assess and report one of the most common web application threats: Cross-Site Scripting (XSS).
What is evilreplay?
At its core, evilreplay is a weaponized adaptation of the legitimate, enterprise-grade session replay software OpenReplay. While standard session replay tools are used by developers to debug applications by recording user interactions, evilreplay repurposes this technology for offensive security.

- Payload Injection: The attacker injects the evilreplay JavaScript payload into the vulnerable web application.
- Session Hijacking/Monitoring: Once the victim loads the compromised page, the payload executes. It establishes a covert connection to a server controlled by the attacker and begins recording and transmitting nearly every action the victim performs.
- Remote Control: Critically, the attacker gains a real-time, interactive user interface (UI) to control the victim’s browser remotely. The security professional can simulate actions like clicking buttons, typing in forms, and navigating to new pages—all through the victim’s authenticated session.
In summary, evilreplay transforms a theoretical XSS finding into a high-impact, actionable demonstration, making it a valuable instrument for both learning and professional security assessment.evilreplay GitHub Repository. EgeBalci. Seamless remote browser session control. https://github.com/EgeBalci/evilreplay
