Xenotix XSS Exploit Framework 2013 v2
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What releases are available for this project?
|| is this project?
| Name: OWASP Xenotix XSS Exploit Framework
| Purpose: OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
| License: Creative Commons Attribution ShareAlike 3.0 License
|| is working on this project?
| Project Leader(s):
|| can you learn more?
| Project Pamphlet: Not Yet Created
| Project Presentation:
| Mailing list: Mailing List Archives
| Project Roadmap: View
- Contact Ajin Abraham @ to contribute to this project
- Contact Ajin Abraham @ to review or sponsor this project
- Contact the GPC to report a problem or concern about this project or to update information.
Features of Xenotix XSS Exploit Framework
- Built in XSS Payloads
- XSS Key logger
- XSS Executable Drive-by downloader
- Automatic XSS Testing
- XSS Encoder
- XSS Reverse Shell (new)
Support us on Facebook
Xenotix on Facebook
Download From Exploit-DB
Download From PacketStorm Security
Xenotix XSS Exploit Framework 2012 Version 2 Tutorial
Xenotix XSS Exploit Framework 2013 Version 3 Tutorial
- Download Version 3 File:Xenotix XSS Exploit Framework 2013 v2.zip
- Download Version 2 File:Xenotix XSS Exploitation Framework.zip
The tool may be detected by some Anti-virus solutions as a threat. However it is due to the features in the exploitation framework.