Difference between revisions of "OWASP Xenotix XSS Exploit Framework"

Jump to: navigation, search
Line 1: Line 1:
=Xenotix XSS Exploit Framework=
=Xenotix XSS Exploit Framework=
Xenotix XSS Exploit Framework is a penetration testing tool to detect and exploit XSS vulnerabilities in Web Applications. This tool can inject codes into a webpage which are vulnerable to XSS. It is basically a payload list based XSS Scanner. It provides a penetration tester the ability to test all the possible XSS payloads available in the payload list against a web application with ease. The tool supports both manual mode and automated time sharing based test modes. It includes a XSS encoder, a victim side keystroke logger, and an Executable Drive-by downloader.
=Project About=
[[Category:OWASP Project]]
[[Category:OWASP Project]]
=Features of Xenotix XSS Exploit Framework=
# Built in XSS Payloads
# XSS Key logger
# XSS Executable Drive-by downloader
# Automatic XSS Testing
# XSS Encoder
[http://https://www.facebook.com/xenotix Xenotix on Facebook]

Revision as of 10:27, 10 August 2012

Xenotix XSS Exploit Framework


What does this OWASP project offer you?
What releases are available for this project?
what is this project?
Name: OWASP Xenotix XSS Exploit Framework
Purpose: OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
License: Creative Commons Attribution ShareAlike 3.0 License
who is working on this project?
Project Leader(s):
  • Ajin Abraham @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
  • Contact Ajin Abraham @ to contribute to this project
  • Contact Ajin Abraham @ to review or sponsor this project
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
Not Yet Published
last reviewed release
Not Yet Reviewed

other releases

Features of Xenotix XSS Exploit Framework

  1. Built in XSS Payloads
  2. XSS Key logger
  3. XSS Executable Drive-by downloader
  4. Automatic XSS Testing
  5. XSS Encoder

Xenotix on Facebook