Difference between revisions of "OWASP Xenotix XSS Exploit Framework"

Jump to: navigation, search
Line 53: Line 53:
=Support us on Facebook=
=Support us on Facebook=
[https://www.facebook.com/xenotix Xenotix on Facebook]
*[https://www.facebook.com/xenotix Xenotix on Facebook]
=White Paper=
=White Paper=
Line 79: Line 79:
=Talk on OWASP Xenotix XSS Exploit Framework [video] =
=Talk on OWASP Xenotix XSS Exploit Framework [video] =
[http://www.youtube.com/watch?v=NYZLP0q7-y4 OWASP Xenotix XSS Exploit Framework v2 2012: Talk at ClubHack 2012, India]
*[http://www.youtube.com/watch?v=NYZLP0q7-y4 OWASP Xenotix XSS Exploit Framework v2 2012: Talk at ClubHack 2012, India]

Revision as of 11:09, 31 July 2013

Xenotix XSS Exploit Framework v4 2013


What does this OWASP project offer you?
What releases are available for this project?
what is this project?
Name: OWASP Xenotix XSS Exploit Framework
Purpose: OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
License: Creative Commons Attribution ShareAlike 3.0 License
who is working on this project?
Project Leader(s):
  • Ajin Abraham @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
  • Contact Ajin Abraham @ to contribute to this project
  • Contact Ajin Abraham @ to review or sponsor this project
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
Not Yet Published
last reviewed release
Not Yet Reviewed

other releases

The Framework is divided into 4 different modules.


  • Manual Mode Scanner
  • Auto Mode Scanner
  • DOM Scanner
  • Multiple Parameter Scanner
  • POST Request Scanner
  • Header Scanner
  • Fuzzer
  • Hidden Parameter Detector


  • Victim Fingerprinting
  • Browser Fingerprinting
  • Browser Features Detector
  • Ping Scan
  • Port Scan
  • Internal Network Scan


  • Send Message
  • Cookie Thief
  • Phisher
  • Tabnabbing
  • Keylogger
  • HTML5 DDoSer
  • Executable Drive By
  • JavaScript Shell
  • Reverse HTTP WebShell
  • Drive-By Reverse Shell
  • Metasploit Browser Exploit
  • Firefox Reverse Shell Addon (Persistent)
  • Firefox Session Stealer Addon (Persistent)
  • Firefox Keylogger Addon (Persistent)
  • Firefox DDoSer Addon (Persistent)
  • Firefox Linux Credential File Stealer Addon (Persistent)
  • Firefox Download and Execute Addon (Persistent)


  • WebKit Developer Tools
  • Payload Encoder

Support us on Facebook

White Paper


Version 3 Videos

Version 2 Videos

Version 1 Videos

Talk on OWASP Xenotix XSS Exploit Framework [video]



The tool may be detected by some Anti-virus solutions as a threat. However it is due to the features in the exploitation framework.