<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Caloomis</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Caloomis"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Caloomis"/>
		<updated>2026-05-08T18:59:31Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5131</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5131"/>
				<updated>2006-06-07T11:52:34Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:xssAttacks.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 brings together a host of web application security testing tools into one convenient package. It is designed to be used in the Firefox browser. CAL9000 functionality may be limited when used with other browsers.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features(like executing cross-domain XMLHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a web server.&lt;br /&gt;
&lt;br /&gt;
While using CAL9000, the Firefox browser may pop up windows asking you to grant exceptions to its security policy. These are normal and may be safely accepted. If you are leery of approving these requests, you can review the source code until you are comfortable with CAL9000's functionality. I can say with reasonable certainty that CAL9000 will not go crazy and try to kill you.&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* RightClick [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the Discussion Tab above.&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:XssAttacks.jpg&amp;diff=5130</id>
		<title>File:XssAttacks.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:XssAttacks.jpg&amp;diff=5130"/>
				<updated>2006-06-07T11:51:36Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: Screenshot of CAL9000&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Screenshot of CAL9000&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5065</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5065"/>
				<updated>2006-06-06T13:31:48Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 brings together a host of web application security testing tools into one convenient package. It is designed to be used in the Firefox browser. CAL9000 functionality may be limited when used with other browsers.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features(like executing cross-domain XMLHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a web server.&lt;br /&gt;
&lt;br /&gt;
While using CAL9000, the Firefox browser may pop up windows asking you to grant exceptions to its security policy. These are normal and may be safely accepted. If you are leery of approving these requests, you can review the source code until you are comfortable with CAL9000's functionality. I can say with reasonable certainty that CAL9000 will not go crazy and try to kill you.&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* RightClick [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the Discussion Tab above.&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category_talk:OWASP_CAL9000_Project&amp;diff=5062</id>
		<title>Category talk:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category_talk:OWASP_CAL9000_Project&amp;diff=5062"/>
				<updated>2006-06-06T13:18:04Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''We need your input! Ask questions, make comments or suggest new features for CAL9000 below.'''&lt;br /&gt;
&lt;br /&gt;
== Click the edit+ button to add a comment ==&lt;br /&gt;
&lt;br /&gt;
Edit this page and ask your question here&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=5059</id>
		<title>OWASP CAL9000 Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=5059"/>
				<updated>2006-06-06T13:05:44Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Provide a centralized framework for the organization and use of a variety of tools that can&lt;br /&gt;
  assist web application security testers with their manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Soliciting comments, suggestions and feature requests from users.&lt;br /&gt;
# Exploring ways to enhance the functionality of the tool when used in browsers other than Firefox. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals...&lt;br /&gt;
&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CAL9000 Project]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=5058</id>
		<title>OWASP CAL9000 Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=5058"/>
				<updated>2006-06-06T13:04:53Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Provide a centralized framework for the organization and use of a variety of tools that can&lt;br /&gt;
  assist web application security testers with their manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Soliciting comments, suggestions and feature requests from users.&lt;br /&gt;
# Exploring ways to enhance the functionality of the tool while used in browsers other than Firefox. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals...&lt;br /&gt;
&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CAL9000 Project]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5049</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5049"/>
				<updated>2006-06-06T01:18:04Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 brings together a host of web application security testing tools into one convenient package. It is designed to be used in the Firefox browser. CAL9000 functionality may be limited when used with other browsers.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features(like executing cross-domain XMLHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a web server.&lt;br /&gt;
&lt;br /&gt;
While using CAL9000, the Firefox browser may pop up windows asking you to grant exceptions to its security policy. These are normal and may be safely accepted. If you are leery of approving these requests, you can review the source code until you are comfortable with CAL9000's functionality. I can say with reasonable certainty that CAL9000 will not go crazy and try to kill you.&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* RightClick [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5048</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5048"/>
				<updated>2006-06-06T01:01:55Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* RightClick [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5047</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5047"/>
				<updated>2006-06-06T00:58:30Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: /* Roadmap */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* Click [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* Click [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5046</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5046"/>
				<updated>2006-06-06T00:53:20Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* Click [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* Click [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5045</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5045"/>
				<updated>2006-06-06T00:42:32Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
* Click [http://www.digilantesecurity.com/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* Click [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. &lt;br /&gt;
Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5044</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5044"/>
				<updated>2006-06-06T00:10:07Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a listing of the XSS Attack Info from RSnake. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently runs the project. Any and all questions, comments or suggestions are welcome and may be directed  [mailto:cal9000tool@mac.com here].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5042</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5042"/>
				<updated>2006-06-05T23:41:45Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a listing of the XSS Attack Info from RSnake. You can also try executing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following: URL, Hex, Unicode, Html(Decimal), Base64, MD5. Encode only for Sha1 and Sha256.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5041</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=5041"/>
				<updated>2006-06-05T23:34:08Z</updated>
		
		<summary type="html">&lt;p&gt;Caloomis: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Caloomis</name></author>	</entry>

	</feed>