<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Epsylon</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Epsylon"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Epsylon"/>
		<updated>2026-05-07T05:41:12Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_XSSER&amp;diff=256071</id>
		<title>Projects/OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_XSSER&amp;diff=256071"/>
				<updated>2019-11-16T18:16:50Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: A new code has been released&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; |'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: &amp;quot;The Cross Site Scripting Framework&amp;quot;''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; |'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Project Leader&amp;lt;br&amp;gt;[[User:Psy|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! style=&amp;quot;background:#7B8ABD; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Last Package''' &lt;br /&gt;
 ! style=&amp;quot;background:#7B8ABD; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! style=&amp;quot;background:#7B8ABD; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |'''[https://xsser.03c8.net/xsser/xsser_1.8-2.tar.gz XSSer &amp;quot;The Hive!&amp;quot; (v1.8-2)]'''&lt;br /&gt;
XSSer (.deb): https://xsser.03c8.net/xsser/xsser_1.8.2_all.deb&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |[https://xsser.03c8.net '''Official site'''] &amp;lt;br&amp;gt; [https://github.com/epsylon/xsser '''Code Repository''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Paper(2009): 'XSS for fun and profit':&amp;lt;br&amp;gt;[https://xsser.03c8.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [https://xsser.03c8.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
=Current Version=&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:Thehive1.png|thumb|TheHive]]&amp;lt;br&amp;gt;&lt;br /&gt;
XSSer v1.8-[2] (&amp;quot;&amp;lt;u&amp;gt;The Hiv3!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download (.tar.gz) source code: '''[https://xsser.03c8.net/xsser/xsser_1.8-2.tar.gz XSSer_v1.8-2.tar.gz]'''&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download (.zip) source code: '''[https://xsser.03c8.net/xsser/xsser_1.8-2.zip XSSer_v1.8-2.zip]'''&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Github- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
$ git clone https://github.com/epsylon/xsser&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface: &amp;lt;b&amp;gt;xsser --gtk&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-gui.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/f/f7/Xsser-zika-gui.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-tor.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/b/b1/Xsser-zika-tor.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-map.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/7/74/Xsser-zika-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-spidering.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/3/38/Xsser-zika-spidering.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
= How it works=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Xsser-url-schema.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/f/f9/Xsser-url-schema.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=Installation=&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms. It requires Python (3.x) and the following libraries:&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
* python3-pycurl - Python bindings to libcurl (Python 3)&lt;br /&gt;
* python3-bs4 - error-tolerant HTML parser for Python 3&lt;br /&gt;
* python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library&lt;br /&gt;
* python3-geoip2 - Python geoip2 API for web services and databases - Python 3.x&lt;br /&gt;
* python3-gi - Python 3 bindings for gobject-introspection libraries&lt;br /&gt;
* python3-cairocffi - cffi-based cairo bindings for Python (Python3)&lt;br /&gt;
You can automatically get all required libraries using (as root):&lt;br /&gt;
&lt;br /&gt;
'''sudo python setup.py install'''&lt;br /&gt;
&lt;br /&gt;
For manual installation on Debian-based systems (ex: Ubuntu), run:&lt;br /&gt;
&lt;br /&gt;
'''sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-geoip2 python3-cairocffi'''&lt;br /&gt;
&lt;br /&gt;
On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run:&lt;br /&gt;
&lt;br /&gt;
'''sudo pip3 install pycurl bs4 geoip2 gobject cairocffi'''&lt;br /&gt;
&lt;br /&gt;
=Options=&lt;br /&gt;
&lt;br /&gt;
Usage: &lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [--all &amp;lt;url&amp;gt; |-u &amp;lt;url&amp;gt; |-i &amp;lt;file&amp;gt; |-d &amp;lt;dork&amp;gt; (options)|-l ] [-g &amp;lt;get&amp;gt; |-p &amp;lt;post&amp;gt; |-c &amp;lt;crawl&amp;gt; (options)]&lt;br /&gt;
[Request(s)] [Checker(s)] [Vector(s)] [Anti-antiXSS/IDS] [Bypasser(s)] [Technique(s)] [Final Injection(s)] [Reporting] {Miscellaneous}&lt;br /&gt;
&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and&lt;br /&gt;
report XSS vulnerabilities in web-based applications.&lt;br /&gt;
&lt;br /&gt;
Options:&lt;br /&gt;
  --version             show program's version number and exit&lt;br /&gt;
  -h, --help            show this help message and exit&lt;br /&gt;
  -s, --statistics      show advanced statistics output results&lt;br /&gt;
  -v, --verbose         active verbose mode output results&lt;br /&gt;
  --gtk                 launch XSSer GTK Interface&lt;br /&gt;
  --wizard              start Wizard Helper!&lt;br /&gt;
&lt;br /&gt;
  *Special Features*:&lt;br /&gt;
    You can set Vector(s) and Bypasser(s) to build complex scripts for XSS&lt;br /&gt;
    code embedded. XST allows you to discover if target is vulnerable to&lt;br /&gt;
    'Cross Site Tracing' [CAPEC-107]:&lt;br /&gt;
&lt;br /&gt;
    --imx=IMX           IMX - Create an image with XSS (--imx image.png)&lt;br /&gt;
    --fla=FLASH         FLA - Create a flash movie with XSS (--fla movie.swf)&lt;br /&gt;
    --xst=XST           XST - Cross Site Tracing (--xst http(s)://host.com)&lt;br /&gt;
&lt;br /&gt;
  *Select Target(s)*:&lt;br /&gt;
    At least one of these options must to be specified to set the source&lt;br /&gt;
    to get target(s) urls from:&lt;br /&gt;
&lt;br /&gt;
    --all=TARGET        Automatically audit an entire target&lt;br /&gt;
    -u URL, --url=URL   Enter target to audit&lt;br /&gt;
    -i READFILE         Read target(s) urls from file&lt;br /&gt;
    -d DORK             Search target(s) using a query (ex: 'news.php?id=')&lt;br /&gt;
    -l                  Search from a list of 'dorks'&lt;br /&gt;
    --De=DORK_ENGINE    Use this search engine (default: yahoo)&lt;br /&gt;
    --Da                Search massively using all search engines&lt;br /&gt;
&lt;br /&gt;
  *Select type of HTTP/HTTPS Connection(s)*:&lt;br /&gt;
    These options can be used to specify which parameter(s) we want to use&lt;br /&gt;
    as payload(s). Set 'XSS' as keyword on the place(s) that you want to&lt;br /&gt;
    inject:&lt;br /&gt;
&lt;br /&gt;
    -g GETDATA          Send payload using GET (ex: '/menu.php?id=XSS')&lt;br /&gt;
    -p POSTDATA         Send payload using POST (ex: 'foo=1&amp;amp;bar=XSS')&lt;br /&gt;
    -c CRAWLING         Number of urls to crawl on target(s): 1-99999&lt;br /&gt;
    --Cw=CRAWLER_WIDTH  Deeping level of crawler: 1-5 (default: 2)&lt;br /&gt;
    --Cl                Crawl only local target(s) urls (default: FALSE)&lt;br /&gt;
&lt;br /&gt;
  *Configure Request(s)*:&lt;br /&gt;
    These options can be used to specify how to connect to the target(s)&lt;br /&gt;
    payload(s). You can choose multiple:&lt;br /&gt;
&lt;br /&gt;
    --head              Send a HEAD request before start a test&lt;br /&gt;
    --cookie=COOKIE     Change your HTTP Cookie header&lt;br /&gt;
    --drop-cookie       Ignore Set-Cookie header from response&lt;br /&gt;
    --user-agent=AGENT  Change your HTTP User-Agent header (default: SPOOFED)&lt;br /&gt;
    --referer=REFERER   Use another HTTP Referer header (default: NONE)&lt;br /&gt;
    --xforw             Set your HTTP X-Forwarded-For with random IP values&lt;br /&gt;
    --xclient           Set your HTTP X-Client-IP with random IP values&lt;br /&gt;
    --headers=HEADERS   Extra HTTP headers newline separated&lt;br /&gt;
    --auth-type=ATYPE   HTTP Authentication type (Basic, Digest, GSS or NTLM)&lt;br /&gt;
    --auth-cred=ACRED   HTTP Authentication credentials (name:password)&lt;br /&gt;
    --check-tor         Check to see if Tor is used properly&lt;br /&gt;
    --proxy=PROXY       Use proxy server (tor: http://localhost:8118)&lt;br /&gt;
    --ignore-proxy      Ignore system default HTTP proxy&lt;br /&gt;
    --timeout=TIMEOUT   Select your timeout (default: 30)&lt;br /&gt;
    --retries=RETRIES   Retries when connection timeout (default: 1)&lt;br /&gt;
    --threads=THREADS   Maximum number of concurrent requests (default: 5)&lt;br /&gt;
    --delay=DELAY       Delay in seconds between each request (default: 0)&lt;br /&gt;
    --tcp-nodelay       Use the TCP_NODELAY option&lt;br /&gt;
    --follow-redirects  Follow server redirection responses (302)&lt;br /&gt;
    --follow-limit=FLI  Set limit for redirection requests (default: 50)&lt;br /&gt;
&lt;br /&gt;
  *Checker Systems*:&lt;br /&gt;
    These options are useful to know if your target is using filters&lt;br /&gt;
    against XSS attacks:&lt;br /&gt;
&lt;br /&gt;
    --hash              Send a hash to check if target is repeating content&lt;br /&gt;
    --heuristic         Discover parameters filtered by using heuristics&lt;br /&gt;
    --discode=DISCODE   Set code on reply to discard an injection&lt;br /&gt;
    --checkaturl=ALT    Check reply using: &amp;lt;alternative url&amp;gt; [aka BLIND-XSS]&lt;br /&gt;
    --checkmethod=ALTM  Check reply using: GET or POST (default: GET)&lt;br /&gt;
    --checkatdata=ALD   Check reply using: &amp;lt;alternative payload&amp;gt;&lt;br /&gt;
    --reverse-check     Establish a reverse connection from target to XSSer&lt;br /&gt;
    --reverse-open      Open a web browser when a reverse check is established&lt;br /&gt;
&lt;br /&gt;
  *Select Vector(s)*:&lt;br /&gt;
    These options can be used to specify injection(s) code. Important if&lt;br /&gt;
    you don't want to inject a common XSS vector used by default. Choose&lt;br /&gt;
    only one option:&lt;br /&gt;
&lt;br /&gt;
    --payload=SCRIPT    OWN   - Inject your own code&lt;br /&gt;
    --auto              AUTO  - Inject a list of vectors provided by XSSer&lt;br /&gt;
&lt;br /&gt;
  *Select Payload(s)*:&lt;br /&gt;
    These options can be used to set the list of vectors provided by&lt;br /&gt;
    XSSer. Choose only if required:&lt;br /&gt;
&lt;br /&gt;
    --auto-set=FZZ_NUM  ASET  - Limit of vectors to inject (default: 1293)&lt;br /&gt;
    --auto-info         AINFO - Select ONLY vectors with INFO (defaul: FALSE)&lt;br /&gt;
    --auto-random       ARAND - Set random to order (default: FALSE)&lt;br /&gt;
&lt;br /&gt;
  *Anti-antiXSS Firewall rules*:&lt;br /&gt;
    These options can be used to try to bypass specific WAF/IDS products&lt;br /&gt;
    and some anti-XSS browser filters. Choose only if required:&lt;br /&gt;
&lt;br /&gt;
    --Phpids0.6.5       PHPIDS (0.6.5) [ALL]&lt;br /&gt;
    --Phpids0.7         PHPIDS (0.7) [ALL]&lt;br /&gt;
    --Imperva           Imperva Incapsula [ALL]&lt;br /&gt;
    --Webknight         WebKnight (4.1) [Chrome]&lt;br /&gt;
    --F5bigip           F5 Big IP [Chrome + FF + Opera]&lt;br /&gt;
    --Barracuda         Barracuda WAF [ALL]&lt;br /&gt;
    --Modsec            Mod-Security [ALL]&lt;br /&gt;
    --Quickdefense      QuickDefense [Chrome]&lt;br /&gt;
    --Sucuri            SucuriWAF [ALL]&lt;br /&gt;
    --Firefox           Firefox 12 [&amp;amp; below]&lt;br /&gt;
    --Chrome            Chrome 19 &amp;amp; Firefox 12 [&amp;amp; below]&lt;br /&gt;
    --Opera             Opera 10.5 [&amp;amp; below]&lt;br /&gt;
    --Iexplorer         IExplorer 9 &amp;amp; Firefox 12 [&amp;amp; below]&lt;br /&gt;
&lt;br /&gt;
  *Select Bypasser(s)*:&lt;br /&gt;
    These options can be used to encode vector(s) and try to bypass&lt;br /&gt;
    possible anti-XSS filters. They can be combined with other techniques:&lt;br /&gt;
&lt;br /&gt;
    --Str               Use method String.FromCharCode()&lt;br /&gt;
    --Une               Use Unescape() function&lt;br /&gt;
    --Mix               Mix String.FromCharCode() and Unescape()&lt;br /&gt;
    --Dec               Use Decimal encoding&lt;br /&gt;
    --Hex               Use Hexadecimal encoding&lt;br /&gt;
    --Hes               Use Hexadecimal encoding with semicolons&lt;br /&gt;
    --Dwo               Encode IP addresses with DWORD&lt;br /&gt;
    --Doo               Encode IP addresses with Octal&lt;br /&gt;
    --Cem=CEM           Set different 'Character Encoding Mutations'&lt;br /&gt;
                        (reversing obfuscators) (ex: 'Mix,Une,Str,Hex')&lt;br /&gt;
&lt;br /&gt;
  *Special Technique(s)*:&lt;br /&gt;
    These options can be used to inject code using different XSS&lt;br /&gt;
    techniques and fuzzing vectors. You can choose multiple:&lt;br /&gt;
&lt;br /&gt;
    --Coo               COO - Cross Site Scripting Cookie injection&lt;br /&gt;
    --Xsa               XSA - Cross Site Agent Scripting&lt;br /&gt;
    --Xsr               XSR - Cross Site Referer Scripting&lt;br /&gt;
    --Dcp               DCP - Data Control Protocol injections&lt;br /&gt;
    --Dom               DOM - Document Object Model injections&lt;br /&gt;
    --Ind               IND - HTTP Response Splitting Induced code&lt;br /&gt;
&lt;br /&gt;
  *Select Final injection(s)*:&lt;br /&gt;
    These options can be used to specify the final code to inject on&lt;br /&gt;
    vulnerable target(s). Important if you want to exploit 'on-the-wild'&lt;br /&gt;
    the vulnerabilities found. Choose only one option:&lt;br /&gt;
&lt;br /&gt;
    --Fp=FINALPAYLOAD   OWN    - Exploit your own code&lt;br /&gt;
    --Fr=FINALREMOTE    REMOTE - Exploit a script -remotely-&lt;br /&gt;
&lt;br /&gt;
  *Special Final injection(s)*:&lt;br /&gt;
    These options can be used to execute some 'special' injection(s) on&lt;br /&gt;
    vulnerable target(s). You can select multiple and combine them with&lt;br /&gt;
    your final code (except with DCP exploits):&lt;br /&gt;
&lt;br /&gt;
    --Anchor            ANC  - Use 'Anchor Stealth' payloader (DOM shadows!)&lt;br /&gt;
    --B64               B64  - Base64 code encoding in META tag (rfc2397)&lt;br /&gt;
    --Onm               ONM  - Use onMouseMove() event&lt;br /&gt;
    --Ifr               IFR  - Use &amp;lt;iframe&amp;gt; source tag&lt;br /&gt;
    --Dos               DOS  - XSS (client) Denial of Service&lt;br /&gt;
    --Doss              DOSs - XSS (server) Denial of Service&lt;br /&gt;
&lt;br /&gt;
  *Reporting*:&lt;br /&gt;
    --save              Export to file (XSSreport.raw)&lt;br /&gt;
    --xml=FILEXML       Export to XML (--xml file.xml)&lt;br /&gt;
&lt;br /&gt;
  *Miscellaneous*:&lt;br /&gt;
    --silent            Inhibit console output results&lt;br /&gt;
    --alive=ISALIVE     Set limit of errors before check if target is alive&lt;br /&gt;
    --update            Check for latest stable version&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
    * [[User:Psy|'''psy''']] - [https://03c8.net '''03c8.net''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=256070</id>
		<title>OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=256070"/>
				<updated>2019-11-16T18:15:00Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: A new code has been released&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; |'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: &amp;quot;The Cross Site Scripting Framework&amp;quot;''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; |'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Project Leader&amp;lt;br&amp;gt;[[User:Psy|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! style=&amp;quot;background:#7B8ABD; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Last Package''' &lt;br /&gt;
 ! style=&amp;quot;background:#7B8ABD; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! style=&amp;quot;background:#7B8ABD; color:white&amp;quot; align=&amp;quot;center&amp;quot; |&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |'''[https://xsser.03c8.net/xsser/xsser_1.8-2.tar.gz XSSer &amp;quot;The Hive!&amp;quot; (v1.8-2)]'''&lt;br /&gt;
XSSer (.deb): https://xsser.03c8.net/xsser/xsser_1.8.2_all.deb&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |[https://xsser.03c8.net '''Official site'''] &amp;lt;br&amp;gt; [https://github.com/epsylon/xsser '''Code Repository''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Paper(2009): 'XSS for fun and profit':&amp;lt;br&amp;gt;[https://xsser.03c8.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [https://xsser.03c8.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
=Current Version=&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:Thehive1.png|thumb|TheHive]]&amp;lt;br&amp;gt;&lt;br /&gt;
XSSer v1.8-[2] (&amp;quot;&amp;lt;u&amp;gt;The Hiv3!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download (.tar.gz) source code: '''[https://xsser.03c8.net/xsser/xsser_1.8-2.tar.gz XSSer_v1.8-2.tar.gz]'''&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download (.zip) source code: '''[https://xsser.03c8.net/xsser/xsser_1.8-2.zip XSSer_v1.8-2.zip]'''&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Github- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
$ git clone https://github.com/epsylon/xsser&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface: &amp;lt;b&amp;gt;xsser --gtk&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-gui.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/f/f7/Xsser-zika-gui.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-tor.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/b/b1/Xsser-zika-tor.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-map.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/7/74/Xsser-zika-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:Xsser-zika-spidering.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/3/38/Xsser-zika-spidering.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
= How it works=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Xsser-url-schema.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[https://www.owasp.org/images/f/f9/Xsser-url-schema.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=Installation=&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms. It requires Python (3.x) and the following libraries:&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
* python3-pycurl - Python bindings to libcurl (Python 3)&lt;br /&gt;
* python3-bs4 - error-tolerant HTML parser for Python 3&lt;br /&gt;
* python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library&lt;br /&gt;
* python3-geoip2 - Python geoip2 API for web services and databases - Python 3.x&lt;br /&gt;
* python3-gi - Python 3 bindings for gobject-introspection libraries&lt;br /&gt;
* python3-cairocffi - cffi-based cairo bindings for Python (Python3)&lt;br /&gt;
You can automatically get all required libraries using (as root):&lt;br /&gt;
&lt;br /&gt;
'''sudo python setup.py install'''&lt;br /&gt;
&lt;br /&gt;
For manual installation on Debian-based systems (ex: Ubuntu), run:&lt;br /&gt;
&lt;br /&gt;
'''sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-geoip2 python3-cairocffi'''&lt;br /&gt;
&lt;br /&gt;
On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run:&lt;br /&gt;
&lt;br /&gt;
'''sudo pip3 install pycurl bs4 geoip2 gobject cairocffi'''&lt;br /&gt;
&lt;br /&gt;
=Options=&lt;br /&gt;
&lt;br /&gt;
Usage: &lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [--all &amp;lt;url&amp;gt; |-u &amp;lt;url&amp;gt; |-i &amp;lt;file&amp;gt; |-d &amp;lt;dork&amp;gt; (options)|-l ] [-g &amp;lt;get&amp;gt; |-p &amp;lt;post&amp;gt; |-c &amp;lt;crawl&amp;gt; (options)]&lt;br /&gt;
[Request(s)] [Checker(s)] [Vector(s)] [Anti-antiXSS/IDS] [Bypasser(s)] [Technique(s)] [Final Injection(s)] [Reporting] {Miscellaneous}&lt;br /&gt;
&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and&lt;br /&gt;
report XSS vulnerabilities in web-based applications.&lt;br /&gt;
&lt;br /&gt;
Options:&lt;br /&gt;
  --version             show program's version number and exit&lt;br /&gt;
  -h, --help            show this help message and exit&lt;br /&gt;
  -s, --statistics      show advanced statistics output results&lt;br /&gt;
  -v, --verbose         active verbose mode output results&lt;br /&gt;
  --gtk                 launch XSSer GTK Interface&lt;br /&gt;
  --wizard              start Wizard Helper!&lt;br /&gt;
&lt;br /&gt;
  *Special Features*:&lt;br /&gt;
    You can set Vector(s) and Bypasser(s) to build complex scripts for XSS&lt;br /&gt;
    code embedded. XST allows you to discover if target is vulnerable to&lt;br /&gt;
    'Cross Site Tracing' [CAPEC-107]:&lt;br /&gt;
&lt;br /&gt;
    --imx=IMX           IMX - Create an image with XSS (--imx image.png)&lt;br /&gt;
    --fla=FLASH         FLA - Create a flash movie with XSS (--fla movie.swf)&lt;br /&gt;
    --xst=XST           XST - Cross Site Tracing (--xst http(s)://host.com)&lt;br /&gt;
&lt;br /&gt;
  *Select Target(s)*:&lt;br /&gt;
    At least one of these options must to be specified to set the source&lt;br /&gt;
    to get target(s) urls from:&lt;br /&gt;
&lt;br /&gt;
    --all=TARGET        Automatically audit an entire target&lt;br /&gt;
    -u URL, --url=URL   Enter target to audit&lt;br /&gt;
    -i READFILE         Read target(s) urls from file&lt;br /&gt;
    -d DORK             Search target(s) using a query (ex: 'news.php?id=')&lt;br /&gt;
    -l                  Search from a list of 'dorks'&lt;br /&gt;
    --De=DORK_ENGINE    Use this search engine (default: yahoo)&lt;br /&gt;
    --Da                Search massively using all search engines&lt;br /&gt;
&lt;br /&gt;
  *Select type of HTTP/HTTPS Connection(s)*:&lt;br /&gt;
    These options can be used to specify which parameter(s) we want to use&lt;br /&gt;
    as payload(s). Set 'XSS' as keyword on the place(s) that you want to&lt;br /&gt;
    inject:&lt;br /&gt;
&lt;br /&gt;
    -g GETDATA          Send payload using GET (ex: '/menu.php?id=XSS')&lt;br /&gt;
    -p POSTDATA         Send payload using POST (ex: 'foo=1&amp;amp;bar=XSS')&lt;br /&gt;
    -c CRAWLING         Number of urls to crawl on target(s): 1-99999&lt;br /&gt;
    --Cw=CRAWLER_WIDTH  Deeping level of crawler: 1-5 (default: 2)&lt;br /&gt;
    --Cl                Crawl only local target(s) urls (default: FALSE)&lt;br /&gt;
&lt;br /&gt;
  *Configure Request(s)*:&lt;br /&gt;
    These options can be used to specify how to connect to the target(s)&lt;br /&gt;
    payload(s). You can choose multiple:&lt;br /&gt;
&lt;br /&gt;
    --head              Send a HEAD request before start a test&lt;br /&gt;
    --cookie=COOKIE     Change your HTTP Cookie header&lt;br /&gt;
    --drop-cookie       Ignore Set-Cookie header from response&lt;br /&gt;
    --user-agent=AGENT  Change your HTTP User-Agent header (default: SPOOFED)&lt;br /&gt;
    --referer=REFERER   Use another HTTP Referer header (default: NONE)&lt;br /&gt;
    --xforw             Set your HTTP X-Forwarded-For with random IP values&lt;br /&gt;
    --xclient           Set your HTTP X-Client-IP with random IP values&lt;br /&gt;
    --headers=HEADERS   Extra HTTP headers newline separated&lt;br /&gt;
    --auth-type=ATYPE   HTTP Authentication type (Basic, Digest, GSS or NTLM)&lt;br /&gt;
    --auth-cred=ACRED   HTTP Authentication credentials (name:password)&lt;br /&gt;
    --check-tor         Check to see if Tor is used properly&lt;br /&gt;
    --proxy=PROXY       Use proxy server (tor: http://localhost:8118)&lt;br /&gt;
    --ignore-proxy      Ignore system default HTTP proxy&lt;br /&gt;
    --timeout=TIMEOUT   Select your timeout (default: 30)&lt;br /&gt;
    --retries=RETRIES   Retries when connection timeout (default: 1)&lt;br /&gt;
    --threads=THREADS   Maximum number of concurrent requests (default: 5)&lt;br /&gt;
    --delay=DELAY       Delay in seconds between each request (default: 0)&lt;br /&gt;
    --tcp-nodelay       Use the TCP_NODELAY option&lt;br /&gt;
    --follow-redirects  Follow server redirection responses (302)&lt;br /&gt;
    --follow-limit=FLI  Set limit for redirection requests (default: 50)&lt;br /&gt;
&lt;br /&gt;
  *Checker Systems*:&lt;br /&gt;
    These options are useful to know if your target is using filters&lt;br /&gt;
    against XSS attacks:&lt;br /&gt;
&lt;br /&gt;
    --hash              Send a hash to check if target is repeating content&lt;br /&gt;
    --heuristic         Discover parameters filtered by using heuristics&lt;br /&gt;
    --discode=DISCODE   Set code on reply to discard an injection&lt;br /&gt;
    --checkaturl=ALT    Check reply using: &amp;lt;alternative url&amp;gt; [aka BLIND-XSS]&lt;br /&gt;
    --checkmethod=ALTM  Check reply using: GET or POST (default: GET)&lt;br /&gt;
    --checkatdata=ALD   Check reply using: &amp;lt;alternative payload&amp;gt;&lt;br /&gt;
    --reverse-check     Establish a reverse connection from target to XSSer&lt;br /&gt;
    --reverse-open      Open a web browser when a reverse check is established&lt;br /&gt;
&lt;br /&gt;
  *Select Vector(s)*:&lt;br /&gt;
    These options can be used to specify injection(s) code. Important if&lt;br /&gt;
    you don't want to inject a common XSS vector used by default. Choose&lt;br /&gt;
    only one option:&lt;br /&gt;
&lt;br /&gt;
    --payload=SCRIPT    OWN   - Inject your own code&lt;br /&gt;
    --auto              AUTO  - Inject a list of vectors provided by XSSer&lt;br /&gt;
&lt;br /&gt;
  *Select Payload(s)*:&lt;br /&gt;
    These options can be used to set the list of vectors provided by&lt;br /&gt;
    XSSer. Choose only if required:&lt;br /&gt;
&lt;br /&gt;
    --auto-set=FZZ_NUM  ASET  - Limit of vectors to inject (default: 1293)&lt;br /&gt;
    --auto-info         AINFO - Select ONLY vectors with INFO (defaul: FALSE)&lt;br /&gt;
    --auto-random       ARAND - Set random to order (default: FALSE)&lt;br /&gt;
&lt;br /&gt;
  *Anti-antiXSS Firewall rules*:&lt;br /&gt;
    These options can be used to try to bypass specific WAF/IDS products&lt;br /&gt;
    and some anti-XSS browser filters. Choose only if required:&lt;br /&gt;
&lt;br /&gt;
    --Phpids0.6.5       PHPIDS (0.6.5) [ALL]&lt;br /&gt;
    --Phpids0.7         PHPIDS (0.7) [ALL]&lt;br /&gt;
    --Imperva           Imperva Incapsula [ALL]&lt;br /&gt;
    --Webknight         WebKnight (4.1) [Chrome]&lt;br /&gt;
    --F5bigip           F5 Big IP [Chrome + FF + Opera]&lt;br /&gt;
    --Barracuda         Barracuda WAF [ALL]&lt;br /&gt;
    --Modsec            Mod-Security [ALL]&lt;br /&gt;
    --Quickdefense      QuickDefense [Chrome]&lt;br /&gt;
    --Sucuri            SucuriWAF [ALL]&lt;br /&gt;
    --Firefox           Firefox 12 [&amp;amp; below]&lt;br /&gt;
    --Chrome            Chrome 19 &amp;amp; Firefox 12 [&amp;amp; below]&lt;br /&gt;
    --Opera             Opera 10.5 [&amp;amp; below]&lt;br /&gt;
    --Iexplorer         IExplorer 9 &amp;amp; Firefox 12 [&amp;amp; below]&lt;br /&gt;
&lt;br /&gt;
  *Select Bypasser(s)*:&lt;br /&gt;
    These options can be used to encode vector(s) and try to bypass&lt;br /&gt;
    possible anti-XSS filters. They can be combined with other techniques:&lt;br /&gt;
&lt;br /&gt;
    --Str               Use method String.FromCharCode()&lt;br /&gt;
    --Une               Use Unescape() function&lt;br /&gt;
    --Mix               Mix String.FromCharCode() and Unescape()&lt;br /&gt;
    --Dec               Use Decimal encoding&lt;br /&gt;
    --Hex               Use Hexadecimal encoding&lt;br /&gt;
    --Hes               Use Hexadecimal encoding with semicolons&lt;br /&gt;
    --Dwo               Encode IP addresses with DWORD&lt;br /&gt;
    --Doo               Encode IP addresses with Octal&lt;br /&gt;
    --Cem=CEM           Set different 'Character Encoding Mutations'&lt;br /&gt;
                        (reversing obfuscators) (ex: 'Mix,Une,Str,Hex')&lt;br /&gt;
&lt;br /&gt;
  *Special Technique(s)*:&lt;br /&gt;
    These options can be used to inject code using different XSS&lt;br /&gt;
    techniques and fuzzing vectors. You can choose multiple:&lt;br /&gt;
&lt;br /&gt;
    --Coo               COO - Cross Site Scripting Cookie injection&lt;br /&gt;
    --Xsa               XSA - Cross Site Agent Scripting&lt;br /&gt;
    --Xsr               XSR - Cross Site Referer Scripting&lt;br /&gt;
    --Dcp               DCP - Data Control Protocol injections&lt;br /&gt;
    --Dom               DOM - Document Object Model injections&lt;br /&gt;
    --Ind               IND - HTTP Response Splitting Induced code&lt;br /&gt;
&lt;br /&gt;
  *Select Final injection(s)*:&lt;br /&gt;
    These options can be used to specify the final code to inject on&lt;br /&gt;
    vulnerable target(s). Important if you want to exploit 'on-the-wild'&lt;br /&gt;
    the vulnerabilities found. Choose only one option:&lt;br /&gt;
&lt;br /&gt;
    --Fp=FINALPAYLOAD   OWN    - Exploit your own code&lt;br /&gt;
    --Fr=FINALREMOTE    REMOTE - Exploit a script -remotely-&lt;br /&gt;
&lt;br /&gt;
  *Special Final injection(s)*:&lt;br /&gt;
    These options can be used to execute some 'special' injection(s) on&lt;br /&gt;
    vulnerable target(s). You can select multiple and combine them with&lt;br /&gt;
    your final code (except with DCP exploits):&lt;br /&gt;
&lt;br /&gt;
    --Anchor            ANC  - Use 'Anchor Stealth' payloader (DOM shadows!)&lt;br /&gt;
    --B64               B64  - Base64 code encoding in META tag (rfc2397)&lt;br /&gt;
    --Onm               ONM  - Use onMouseMove() event&lt;br /&gt;
    --Ifr               IFR  - Use &amp;lt;iframe&amp;gt; source tag&lt;br /&gt;
    --Dos               DOS  - XSS (client) Denial of Service&lt;br /&gt;
    --Doss              DOSs - XSS (server) Denial of Service&lt;br /&gt;
&lt;br /&gt;
  *Reporting*:&lt;br /&gt;
    --save              Export to file (XSSreport.raw)&lt;br /&gt;
    --xml=FILEXML       Export to XML (--xml file.xml)&lt;br /&gt;
&lt;br /&gt;
  *Miscellaneous*:&lt;br /&gt;
    --silent            Inhibit console output results&lt;br /&gt;
    --alive=ISALIVE     Set limit of errors before check if target is alive&lt;br /&gt;
    --update            Check for latest stable version&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
    * [[User:Psy|'''psy''']] - [https://03c8.net '''03c8.net''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2013&amp;diff=157360</id>
		<title>WASPY Awards 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2013&amp;diff=157360"/>
				<updated>2013-08-26T17:12:01Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY-BANNER.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Web Application Security People of the Year Awards 2013'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' &lt;br /&gt;
&lt;br /&gt;
Anyone in the Community&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What:''' &lt;br /&gt;
&lt;br /&gt;
WASPY Awards 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
Call for nominees  http://www.tfaforms.com/284578&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' &lt;br /&gt;
&lt;br /&gt;
May 7 – Call for nominees  http://www.tfaforms.com/284578&lt;br /&gt;
&lt;br /&gt;
August 16 – Call for nominees closes&lt;br /&gt;
&lt;br /&gt;
August 19 – Announcement of nominees per category &lt;br /&gt;
&lt;br /&gt;
September 6 – Deadline for bio and profile picture to be submitted&lt;br /&gt;
&lt;br /&gt;
September 30 – Paid member deadline '''Not sure if you are a current member?''' [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0Ag5ZloRZ0SmjdElHZnp5VnozSXFfR0c3UkF1WHh5dVE&amp;amp;hl=en#gid=0 Member Directory]&lt;br /&gt;
&lt;br /&gt;
October 14 – October 25 – Voting process (will be included on the election ballot)&lt;br /&gt;
&lt;br /&gt;
October 29 – Announcement of winners in Special Edition connector &amp;amp; recognition at AppSecUSA 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why:''' &lt;br /&gt;
&lt;br /&gt;
Every year a group of individuals including researchers, developers, security professionals and others work to ensure the security of web applications. Some of these individuals are featured in news stories or at conferences as recognized experts. But there are many other ‘unsung heroes’ that work every day to improve web application security and yet are rarely recognized. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Categories:'''&lt;br /&gt;
&lt;br /&gt;
*Best Chapter Leader&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Chapter &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Paul_Scott Paul Scott]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Houston Houston]||align=&amp;quot;center&amp;quot;|&amp;quot;Paul has taken the Houston chapter from non-existent to one of the best I've seen. Every month something is going on, whether it's a &amp;quot;mini-con&amp;quot;, a hands-on workshop, or a happy hour.  He is very organized and enthusiastic.  This leads to having sponsors, which helps encourage attendance.  I'm a former OWASP chapter leader in Kansas City and have attended OWASP chapter meetings in Houston, Denver, New York, and London.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Jonathan_Marcil Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Montr%C3%A9al Montreal]||align=&amp;quot;center&amp;quot;|&amp;quot;Jonathan has been really active since he has been elected as the new chapter leader in Montreal. He has been able to reach a lot of developers that had no idea what was OWASP by simply going in event and talking to them one-o-one. &lt;br /&gt;
&lt;br /&gt;
He's really dedicated to OWASP and his chapter, he spend at least 20 to 25 hours a week organizing, he also attended BlackHat and sat at the official OWASP booth to distribute and inform people about the wonderful organization that OWASP is.&lt;br /&gt;
&lt;br /&gt;
I've never seen a chapter leader active like him, he definately deserve an award.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Iran Iran] ||align=&amp;quot;center&amp;quot;|&amp;quot;Abbas Naderi, Chapter Leader in Iran is one of the most helpful person I know. I choose him above all others because of his dedication towards pulling forward the entire security community. He demonstrated this act when he agreed to help me in Google Summer of Code Project even when he knew that he was not going to gain money or knowledge out of this. He helped my project just because he wanted everyone in security community to move forward. While working with him, I realized the vast amount of knowledge he possesses. His ideas and his dedication inspires me and I am proud to say that I have set my goal to be like him one day.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:John.wilander John Wilander]||align=&amp;quot;center&amp;quot;|Sweden||align=&amp;quot;center&amp;quot;|&amp;quot;John has shown that he is one of the best chapter leaders of OWASP. He recently stepped down, but I believe he should be given the award regardless.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Jack_Mannino Jack Mannino]|| align=&amp;quot;center&amp;quot;|Northern Virginia||align=&amp;quot;center&amp;quot;|&amp;quot;Jack Mannino has brought top-notch speakers from Jim Manico, to Dan Cornell, and the Twitter appsec team as well as secured an amazing spot with LivingSocial for our meetings. Jack is fostering not only interested speaking events but hackathons and code projects. He is definitely going above and beyond. Most importantly, this chapter is consistent and 100% vendor neutral! Under his leadership, things are already on the right path and headed for even greater destinations. &lt;br /&gt;
&lt;br /&gt;
Lastly, Jack is one of the leaders of the OWASP Mobile project as well the sole developer for the OWASP project GoatDroid. &lt;br /&gt;
&lt;br /&gt;
If anyone deserves my nomination, it's him!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Tin Zaw, Richard Greenberg, Kelly FitzGerald, Stuart Schwartz, Edward Bonver|| align=&amp;quot;center&amp;quot;|Los Angeles||align=&amp;quot;center&amp;quot;|&amp;quot;Tin was the leader of OWASP for the last several years. During his tenure, Tin created a formal board, solidified partnerships with ISSA, SCALE, B-Sides, .Net users groups and CSA, helped other nearby chapters and, took a leading role in the organization of the 2010 Global OWASP AppSec conference in Irvine, presented in several OWASP conferences e chapters and served as a chair in Global Chapter Committees.&lt;br /&gt;
 &lt;br /&gt;
Under Tin's leadership, the chapter grew from an average attendance of ~20-30 security enthusiasts to ~60-100+ in every meetings. OWASP LA conducted meetings religiously every month and the board goes out of their way to screen and invite excellent speakers. In addition, the board does an excellent job communicating the meeting agenda on our OWASP wiki and other social networks besides taking care of the meeting logistics (quality free food, sponsorship and more). The quality of the talks is so consistent that even other security organizations in LA (informally) acknowledge that OWASP has the best technical talks about security in town!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Trenton Ivey|| align=&amp;quot;center&amp;quot;|Milwaukee||align=&amp;quot;center&amp;quot;|&amp;quot;Prior to 2012 there was no OWASP chapter in the Milwaukee area.  One man, Trenton Ivey, had a vision. That vision was to establish the Milwaukee OWASP chapter.  Through his bold leadership and keen insight he worked with the national OWASP association.  His tireless work resulted in a fully functional OWASP Milwaukee Chapter. The response from Information Security professionals in the area was overwhelming.  He has provided the local Information Security community a means to learn new technologies and stay current with emerging trends. Most importantly, we have the opportunity to collaborate and share ideas with our peers.&lt;br /&gt;
&lt;br /&gt;
His dedication to the field of information security and passion for spreading knowledge has enriched the lives of  chapter members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[David Hughes]]||align=&amp;quot;center&amp;quot;|Austin||align=&amp;quot;center&amp;quot;|&amp;quot;David is the current leader of the OWASP Austin Chapter and has done an amazing job over the past year and a half to continue what makes Austin the best chapter in the country.  Under his leadership, the chapter meetings have grown significantly in size, we have monthly sponsored happy hours, we do weekly study groups, and we hosted the single largest fundraiser for OWASP with 750 attendees at AppSec USA 2012.  David has expanded our leadership team to include several new members and he has set us up for success for many years to come.  OWASP Austin is the best chapter on the planet and David is the best active chapter leader hands down.  He truly deserves this award.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[Dhruv Soi]]||align=&amp;quot;center&amp;quot;|India||align=&amp;quot;center&amp;quot;|&amp;quot;My journey with OWASP started in the year 2006 when I formally started the chapter activities in New Delhi, India. Online mailing list had merely 10-20 subscribers and the visibility in different sectors on local industry was too low. There weren't even other active regional chapters in India. &lt;br /&gt;
&lt;br /&gt;
We started with the chapter meets at very large software development companies in India which started providing visibility to the OWASP as a brand. In 2008, after 2 years of ground work, I announced the very first OWASP conference in the region. Holding a conference for the first time was a challenge but it went very well with participation from around 400 professionals. Our this year's event is lined up for August 2013.&lt;br /&gt;
&lt;br /&gt;
Later, I was promoted by OWASP Foundation as Chair - OWASP India to promote OWASP activities nation wide. Today, we have got 10 active chapters in India and I was instrumental in formation of many new chapters by coordinating with OWASP Foundation US and mentoring the new chapter leads. Our local New Delhi OWASP Mailing list has grown to nearly 800 subscribers which is amongst largest OWASP mailing lists and we have thus far organized 3 OWASP conferences. Good thing has been that OWASP's conferences in India are the largest cyber security events in the region.&lt;br /&gt;
&lt;br /&gt;
I even took an initiative to bring OWASP India to social media by creating LinkedIn profile, Facebook, Twitter and Googleplus pages and am actively maintaining all of these for promotion of local activities. Our LinkedIn and Facebook pages have more than 450 Fans/Followers which I see as a considerable number from a region.&lt;br /&gt;
&lt;br /&gt;
I also facilitated alliances with other not-for-profit organizations to gain further visibility in other communities.&lt;br /&gt;
&lt;br /&gt;
In most of our past events, I invited top brass from Government which helped in gaining more outreach into Government sector. We even included professors from Universities to make students also aware about OWASP. Total 500+ companies have so far participated in our last conferences.&lt;br /&gt;
&lt;br /&gt;
We always kept focus on quality and branding in our events which was lauded by a representative from OWASP Foundation in our 2012 event which is also mentioned in the post-event report.&lt;br /&gt;
&lt;br /&gt;
In these 7 years of my association, I have tried to promote OWASP in the region by all kind of promotional methods online, social media, private meetings, chapter meets, conferences, industry alliances etc.&lt;br /&gt;
&lt;br /&gt;
Wikipedia history, owasp.in website, OWASP Foundation report on 2012 OWASP India event, owasp-delhi mailing list subscriber list can be looked as supporting documents.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Project Leader&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Project &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_PHP_Security_Project PHP Security Project]||align=&amp;quot;center&amp;quot;|I have known Abbas since last 4 months. Within this time I had the opportunity to see this person in action. He is one of the most dynamic, helpful and knowledgeable persons I know. I met him during Google Summer of Code. He is one of the mentors in this program. I have seen him help the people and the community even when things were out of reach. His breadth of knowledge in PHP is quite outstanding and his appeal to knowledge and security is quite inspiring for a lot of people including me. I wish him luck and I truly believe that this person deserves the WASPY award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Abbas is doing an excellent work promoting tools and helping  the community with his knowledge and inspiration&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [[Andrew_van_der_Stock|Andrew van der Stock]]||align=&amp;quot;center&amp;quot;|Developer Guide||align=&amp;quot;center&amp;quot;|&amp;quot;Recognition outside community by AusCERT, development of &lt;br /&gt;
- Application Security Verification Standard 2.0&lt;br /&gt;
- OWASP Developer Guide 2013 with a lot of others&lt;br /&gt;
- OWASP Proactive Controls 2013 with Jim Manico&lt;br /&gt;
- and support of other projects like Coding and Testing Guides. &amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ZAP ZAP]||align=&amp;quot;center&amp;quot;|&amp;quot;For his work on ZAP and the constant effort he makes to improve and market the project.&amp;quot;   &lt;br /&gt;
&lt;br /&gt;
&amp;quot;Simon has superbly led the ZAP project through 2012 and into 2013. The project is the most healthy ongoing OWASP project and continues to be updated. It also participated successfully in the GSoC 2012 initiative. Simon has also managed to attract non-coder contributors such as for the translation of the tools content.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Epsylon Epsylon &amp;quot;psy&amp;quot;]|| align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_XSSER XSSer]||align=&amp;quot;center&amp;quot;|From hackers database: http://www.soldierx.com/hdb/psy-epsylon&lt;br /&gt;
&lt;br /&gt;
-OWASP XSSer Founder and project leader.&lt;br /&gt;
-GSoC 2013 proposed Mentor&lt;br /&gt;
-Developer of: XSSer (http://xsser.sf.net)&lt;br /&gt;
-Developer of: CIntruder (http://cintruder.sf.net)&lt;br /&gt;
-Developer of: AnonTwi (http://anontwi.sf.net)&lt;br /&gt;
-Developer of: UFOnet (http://ufonet.sf.net)&lt;br /&gt;
-Different contributions to free software applications such as: Seeks-Project (http://www.seeks-project.info), Elgg (http://elgg.org), Lorea (http://lorea.org), etc...&lt;br /&gt;
-OWASP Spain contributor.&lt;br /&gt;
&lt;br /&gt;
Epsylon has talked about OWASP XSSer at both security and not security events around in Europe: Spain, France, Netherlands and Germany. He is involved in some different social projects giving an important technical support and is doing a good job leading some security educational communities.&lt;br /&gt;
&lt;br /&gt;
+ Videos:&lt;br /&gt;
&lt;br /&gt;
XSSer: http://vimeo.com/album/1943305/video/42466699&lt;br /&gt;
CIntruder: http://vimeo.com/42918290&lt;br /&gt;
&lt;br /&gt;
+ Slides:&lt;br /&gt;
http://www.slideshare.net/rootedcon/lord-epsylon-xsser-the-cross-site-scripting-framework-rootedcon-2012&lt;br /&gt;
http://www.scribd.com/doc/33492680/XSS-for-Fun-and-Profit&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Community Supporter – contributor to chapter, project or initiative&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [[Jason Montgomery]]||align=&amp;quot;center&amp;quot;|&amp;quot;Jason has organized and run several training sessions for OWASP Columbus chapter in 2013. His training sessions help OWASP members better understand how to integrate security into the software development lifecycle.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[Fabio Cerullo]]||align=&amp;quot;center&amp;quot;|&amp;quot;Fabio's work on:&lt;br /&gt;
 &lt;br /&gt;
Google Season of Code&lt;br /&gt;
Latam OWASP Tour&lt;br /&gt;
EU OWASP Tour&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:John.wilander John Wilander]||align=&amp;quot;center&amp;quot;|&amp;quot;John has done so much for OWASP over the years. He deeply supports our international community.&lt;br /&gt;
&lt;br /&gt;
* John founded OWASP Sweden in 2007 and stepped down 2013 with a mailing list of 900+ chapter members, combined under the Sweden umbrella.&lt;br /&gt;
&lt;br /&gt;
* John chaired OWASP AppSec Research 2010 in Stockholm with Microsoft and Google as main sponsors and keynote speakers. Managed to gather a great team/committee. The profit funded a big part of the subsequent Global Summit.&lt;br /&gt;
&lt;br /&gt;
* John organized and chaired the Browser Security Track at the Global Summit in Portugal 2011. Round table discussions with Mozilla, Google, Microsoft, PayPal, Adobe, IETF, and some of the world's best web hackers (Mario Heiderich, Stefano di Paola, Gareth Heyes, Eduardo Vela Nava, and David Lindsay).&lt;br /&gt;
&lt;br /&gt;
* John Co-championed the Builders-Breakers-Defenders communities within OWASP, took on the Builders' Developer Outreach, and went on a two-year mission to give appsec talks at developer conferences, not security conferences.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Mission Outreach – grow the OWASP community&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch]||align=&amp;quot;center&amp;quot;|&amp;quot;Martin tirelessly attends every OWASP conference and supports the OWASP booth. But he also does this at many, many conferences. For example at this year's FOSDEM, Blackhat EU and Hack in the Box Amsterdam. These efforts take a lot of personal time, as well as effort transporting OWASP materials to and from venues.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[Fabio Cerullo]]||align=&amp;quot;center&amp;quot;|&amp;quot;Fabio has been doing an amazing work for OWASP for so many years now, silently, without asking anything in return. I first met him at Appsec EU 2011, which was a great success. We then worked together during OWASP's first year as a GSoC organization, an initiative that Fabio put a lot of effort in and was a great success. He has also successfully run the LatAm tour and now the EU tour, a couple of very large and complex events, with amazing success in spreading the OWASP word in the corresponding areas.&lt;br /&gt;
I believe that Fabio has provided amazing value to OWASP's mission, in an altruistic way, without pursuing promotion for himself or any other benefits. He's the most fitting for the &amp;quot;Best mission outreach&amp;quot; award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For his effort in the Latam Tour, spreading OWASP brand and awareness in Latin America and the OWASP European Tour!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:John.wilander John Wilander]||align=&amp;quot;center&amp;quot;|&amp;quot;John managed to stay a developer and had a massive influence on the developer community with his security knowledge. &lt;br /&gt;
He did this next to his OWASP global involvement at various OWASP conferences of one he organized himself and leading the Swedish chapter.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
*Best Innovator – willingness to try new ideas&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [[Tanoh Aka Marcellin]]||align=&amp;quot;center&amp;quot;|&amp;quot;la raison est que je voudrais lui faire gagner ce prix afin de pouvoir avoir accÃ¨s aux nouveaux outils et surtout pour ce faire des contacts avec le groupe OWASP et pourquoi pas si possible, travailler avec ce groupe merci.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]||align=&amp;quot;center&amp;quot;|&amp;quot;Abbas is developing a new php security library which seems very promising. There is no such a library yet and during the GSOC Abbas is working hard to implement this together as project leader with the student and volunteers &amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Rules:'''&lt;br /&gt;
&lt;br /&gt;
1. Board members can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
2. Paid staff can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
3. Must be a paid member to vote '''Not sure if you are a current member?''' [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0Ag5ZloRZ0SmjdFZILXhCRjQyMjVIRURhNFgzRVZ5aVE&amp;amp;hl=en#gid=0 Member Directory]&lt;br /&gt;
&lt;br /&gt;
4. All nominees will remain anonymous until August 19, 2013&lt;br /&gt;
&lt;br /&gt;
5. Anyone can nominate any individual&lt;br /&gt;
&lt;br /&gt;
6. One person per category may be nominated&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship Opportunities:''' Please see our [https://docs.google.com/a/owasp.org/document/d/1VDBZ4vnJ52XkB2MJ35PCdMUTbS8qFmChkL24-GsygtY/edit# Sponsorship Document] &lt;br /&gt;
&lt;br /&gt;
These awards are funded solely by sponsors.  If you or your company are interested in sponsoring this years WASPY Awards, please let us know by [http://www.tfaforms.com/274270 contacting us] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Information about last years WASPY Awards including our winner Helen Gao and our sponsors Qualys and Trustwave can be found here: https://www.owasp.org/index.php/WASPY_Awards'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; &amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''2013 Sponsors'''&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Platinum'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.qualys.com|logo=Qualys_Logo_For_WASPY_Resized.png}}&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2013&amp;diff=157359</id>
		<title>WASPY Awards 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2013&amp;diff=157359"/>
				<updated>2013-08-26T16:35:54Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY-BANNER.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Web Application Security People of the Year Awards 2013'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' &lt;br /&gt;
&lt;br /&gt;
Anyone in the Community&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What:''' &lt;br /&gt;
&lt;br /&gt;
WASPY Awards 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
Call for nominees  http://www.tfaforms.com/284578&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' &lt;br /&gt;
&lt;br /&gt;
May 7 – Call for nominees  http://www.tfaforms.com/284578&lt;br /&gt;
&lt;br /&gt;
August 16 – Call for nominees closes&lt;br /&gt;
&lt;br /&gt;
August 19 – Announcement of nominees per category &lt;br /&gt;
&lt;br /&gt;
September 6 – Deadline for bio and profile picture to be submitted&lt;br /&gt;
&lt;br /&gt;
September 30 – Paid member deadline '''Not sure if you are a current member?''' [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0Ag5ZloRZ0SmjdElHZnp5VnozSXFfR0c3UkF1WHh5dVE&amp;amp;hl=en#gid=0 Member Directory]&lt;br /&gt;
&lt;br /&gt;
October 14 – October 25 – Voting process (will be included on the election ballot)&lt;br /&gt;
&lt;br /&gt;
October 29 – Announcement of winners in Special Edition connector &amp;amp; recognition at AppSecUSA 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why:''' &lt;br /&gt;
&lt;br /&gt;
Every year a group of individuals including researchers, developers, security professionals and others work to ensure the security of web applications. Some of these individuals are featured in news stories or at conferences as recognized experts. But there are many other ‘unsung heroes’ that work every day to improve web application security and yet are rarely recognized. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Categories:'''&lt;br /&gt;
&lt;br /&gt;
*Best Chapter Leader&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Chapter &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Paul_Scott Paul Scott]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Houston Houston]||align=&amp;quot;center&amp;quot;|&amp;quot;Paul has taken the Houston chapter from non-existent to one of the best I've seen. Every month something is going on, whether it's a &amp;quot;mini-con&amp;quot;, a hands-on workshop, or a happy hour.  He is very organized and enthusiastic.  This leads to having sponsors, which helps encourage attendance.  I'm a former OWASP chapter leader in Kansas City and have attended OWASP chapter meetings in Houston, Denver, New York, and London.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Jonathan_Marcil Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Montr%C3%A9al Montreal]||align=&amp;quot;center&amp;quot;|&amp;quot;Jonathan has been really active since he has been elected as the new chapter leader in Montreal. He has been able to reach a lot of developers that had no idea what was OWASP by simply going in event and talking to them one-o-one. &lt;br /&gt;
&lt;br /&gt;
He's really dedicated to OWASP and his chapter, he spend at least 20 to 25 hours a week organizing, he also attended BlackHat and sat at the official OWASP booth to distribute and inform people about the wonderful organization that OWASP is.&lt;br /&gt;
&lt;br /&gt;
I've never seen a chapter leader active like him, he definately deserve an award.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Iran Iran] ||align=&amp;quot;center&amp;quot;|&amp;quot;Abbas Naderi, Chapter Leader in Iran is one of the most helpful person I know. I choose him above all others because of his dedication towards pulling forward the entire security community. He demonstrated this act when he agreed to help me in Google Summer of Code Project even when he knew that he was not going to gain money or knowledge out of this. He helped my project just because he wanted everyone in security community to move forward. While working with him, I realized the vast amount of knowledge he possesses. His ideas and his dedication inspires me and I am proud to say that I have set my goal to be like him one day.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:John.wilander John Wilander]||align=&amp;quot;center&amp;quot;|Sweden||align=&amp;quot;center&amp;quot;|&amp;quot;John has shown that he is one of the best chapter leaders of OWASP. He recently stepped down, but I believe he should be given the award regardless.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Jack_Mannino Jack Mannino]|| align=&amp;quot;center&amp;quot;|Northern Virginia||align=&amp;quot;center&amp;quot;|&amp;quot;Jack Mannino has brought top-notch speakers from Jim Manico, to Dan Cornell, and the Twitter appsec team as well as secured an amazing spot with LivingSocial for our meetings. Jack is fostering not only interested speaking events but hackathons and code projects. He is definitely going above and beyond. Most importantly, this chapter is consistent and 100% vendor neutral! Under his leadership, things are already on the right path and headed for even greater destinations. &lt;br /&gt;
&lt;br /&gt;
Lastly, Jack is one of the leaders of the OWASP Mobile project as well the sole developer for the OWASP project GoatDroid. &lt;br /&gt;
&lt;br /&gt;
If anyone deserves my nomination, it's him!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Tin Zaw, Richard Greenberg, Kelly FitzGerald, Stuart Schwartz, Edward Bonver|| align=&amp;quot;center&amp;quot;|Los Angeles||align=&amp;quot;center&amp;quot;|&amp;quot;Tin was the leader of OWASP for the last several years. During his tenure, Tin created a formal board, solidified partnerships with ISSA, SCALE, B-Sides, .Net users groups and CSA, helped other nearby chapters and, took a leading role in the organization of the 2010 Global OWASP AppSec conference in Irvine, presented in several OWASP conferences e chapters and served as a chair in Global Chapter Committees.&lt;br /&gt;
 &lt;br /&gt;
Under Tin's leadership, the chapter grew from an average attendance of ~20-30 security enthusiasts to ~60-100+ in every meetings. OWASP LA conducted meetings religiously every month and the board goes out of their way to screen and invite excellent speakers. In addition, the board does an excellent job communicating the meeting agenda on our OWASP wiki and other social networks besides taking care of the meeting logistics (quality free food, sponsorship and more). The quality of the talks is so consistent that even other security organizations in LA (informally) acknowledge that OWASP has the best technical talks about security in town!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Trenton Ivey|| align=&amp;quot;center&amp;quot;|Milwaukee||align=&amp;quot;center&amp;quot;|&amp;quot;Prior to 2012 there was no OWASP chapter in the Milwaukee area.  One man, Trenton Ivey, had a vision. That vision was to establish the Milwaukee OWASP chapter.  Through his bold leadership and keen insight he worked with the national OWASP association.  His tireless work resulted in a fully functional OWASP Milwaukee Chapter. The response from Information Security professionals in the area was overwhelming.  He has provided the local Information Security community a means to learn new technologies and stay current with emerging trends. Most importantly, we have the opportunity to collaborate and share ideas with our peers.&lt;br /&gt;
&lt;br /&gt;
His dedication to the field of information security and passion for spreading knowledge has enriched the lives of  chapter members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[David Hughes]]||align=&amp;quot;center&amp;quot;|Austin||align=&amp;quot;center&amp;quot;|&amp;quot;David is the current leader of the OWASP Austin Chapter and has done an amazing job over the past year and a half to continue what makes Austin the best chapter in the country.  Under his leadership, the chapter meetings have grown significantly in size, we have monthly sponsored happy hours, we do weekly study groups, and we hosted the single largest fundraiser for OWASP with 750 attendees at AppSec USA 2012.  David has expanded our leadership team to include several new members and he has set us up for success for many years to come.  OWASP Austin is the best chapter on the planet and David is the best active chapter leader hands down.  He truly deserves this award.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[Dhruv Soi]]||align=&amp;quot;center&amp;quot;|India||align=&amp;quot;center&amp;quot;|&amp;quot;My journey with OWASP started in the year 2006 when I formally started the chapter activities in New Delhi, India. Online mailing list had merely 10-20 subscribers and the visibility in different sectors on local industry was too low. There weren't even other active regional chapters in India. &lt;br /&gt;
&lt;br /&gt;
We started with the chapter meets at very large software development companies in India which started providing visibility to the OWASP as a brand. In 2008, after 2 years of ground work, I announced the very first OWASP conference in the region. Holding a conference for the first time was a challenge but it went very well with participation from around 400 professionals. Our this year's event is lined up for August 2013.&lt;br /&gt;
&lt;br /&gt;
Later, I was promoted by OWASP Foundation as Chair - OWASP India to promote OWASP activities nation wide. Today, we have got 10 active chapters in India and I was instrumental in formation of many new chapters by coordinating with OWASP Foundation US and mentoring the new chapter leads. Our local New Delhi OWASP Mailing list has grown to nearly 800 subscribers which is amongst largest OWASP mailing lists and we have thus far organized 3 OWASP conferences. Good thing has been that OWASP's conferences in India are the largest cyber security events in the region.&lt;br /&gt;
&lt;br /&gt;
I even took an initiative to bring OWASP India to social media by creating LinkedIn profile, Facebook, Twitter and Googleplus pages and am actively maintaining all of these for promotion of local activities. Our LinkedIn and Facebook pages have more than 450 Fans/Followers which I see as a considerable number from a region.&lt;br /&gt;
&lt;br /&gt;
I also facilitated alliances with other not-for-profit organizations to gain further visibility in other communities.&lt;br /&gt;
&lt;br /&gt;
In most of our past events, I invited top brass from Government which helped in gaining more outreach into Government sector. We even included professors from Universities to make students also aware about OWASP. Total 500+ companies have so far participated in our last conferences.&lt;br /&gt;
&lt;br /&gt;
We always kept focus on quality and branding in our events which was lauded by a representative from OWASP Foundation in our 2012 event which is also mentioned in the post-event report.&lt;br /&gt;
&lt;br /&gt;
In these 7 years of my association, I have tried to promote OWASP in the region by all kind of promotional methods online, social media, private meetings, chapter meets, conferences, industry alliances etc.&lt;br /&gt;
&lt;br /&gt;
Wikipedia history, owasp.in website, OWASP Foundation report on 2012 OWASP India event, owasp-delhi mailing list subscriber list can be looked as supporting documents.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Project Leader&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Project &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_PHP_Security_Project PHP Security Project]||align=&amp;quot;center&amp;quot;|I have known Abbas since last 4 months. Within this time I had the opportunity to see this person in action. He is one of the most dynamic, helpful and knowledgeable persons I know. I met him during Google Summer of Code. He is one of the mentors in this program. I have seen him help the people and the community even when things were out of reach. His breadth of knowledge in PHP is quite outstanding and his appeal to knowledge and security is quite inspiring for a lot of people including me. I wish him luck and I truly believe that this person deserves the WASPY award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Abbas is doing an excellent work promoting tools and helping  the community with his knowledge and inspiration&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [[Andrew_van_der_Stock|Andrew van der Stock]]||align=&amp;quot;center&amp;quot;|Developer Guide||align=&amp;quot;center&amp;quot;|&amp;quot;Recognition outside community by AusCERT, development of &lt;br /&gt;
- Application Security Verification Standard 2.0&lt;br /&gt;
- OWASP Developer Guide 2013 with a lot of others&lt;br /&gt;
- OWASP Proactive Controls 2013 with Jim Manico&lt;br /&gt;
- and support of other projects like Coding and Testing Guides. &amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ZAP ZAP]||align=&amp;quot;center&amp;quot;|&amp;quot;For his work on ZAP and the constant effort he makes to improve and market the project.&amp;quot;   &lt;br /&gt;
&lt;br /&gt;
&amp;quot;Simon has superbly led the ZAP project through 2012 and into 2013. The project is the most healthy ongoing OWASP project and continues to be updated. It also participated successfully in the GSoC 2012 initiative. Simon has also managed to attract non-coder contributors such as for the translation of the tools content.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Epsylon R. Mérida &amp;quot;psy&amp;quot;]|| align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_XSSER XSSer]||align=&amp;quot;center&amp;quot;|From hackers database: http://www.soldierx.com/hdb/psy-epsylon&lt;br /&gt;
&lt;br /&gt;
-OWASP XSSer Founder and project leader.&lt;br /&gt;
-GSoC 2013 proposed Mentor&lt;br /&gt;
-Developer of: XSSer (http://xsser.sf.net)&lt;br /&gt;
-Developer of: CIntruder (http://cintruder.sf.net)&lt;br /&gt;
-Developer of: AnonTwi (http://anontwi.sf.net)&lt;br /&gt;
-Developer of: UFOnet (http://ufonet.sf.net)&lt;br /&gt;
-Different contributions to free software applications such as: Seeks-Project (http://www.seeks-project.info), Elgg (http://elgg.org), Lorea (http://lorea.org), etc...&lt;br /&gt;
-OWASP Spain contributor.&lt;br /&gt;
&lt;br /&gt;
Epsylon has talked about OWASP XSSer at both security and not security events around in Europe: Spain, France, Netherlands and Germany. He is involved in some different social projects giving an important technical support and is doing a good job leading some security educational communities.&lt;br /&gt;
&lt;br /&gt;
+ Videos:&lt;br /&gt;
&lt;br /&gt;
XSSer: http://vimeo.com/album/1943305/video/42466699&lt;br /&gt;
CIntruder: http://vimeo.com/42918290&lt;br /&gt;
&lt;br /&gt;
+ Slides:&lt;br /&gt;
http://www.slideshare.net/rootedcon/lord-epsylon-xsser-the-cross-site-scripting-framework-rootedcon-2012&lt;br /&gt;
http://www.scribd.com/doc/33492680/XSS-for-Fun-and-Profit&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Community Supporter – contributor to chapter, project or initiative&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [[Jason Montgomery]]||align=&amp;quot;center&amp;quot;|&amp;quot;Jason has organized and run several training sessions for OWASP Columbus chapter in 2013. His training sessions help OWASP members better understand how to integrate security into the software development lifecycle.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[Fabio Cerullo]]||align=&amp;quot;center&amp;quot;|&amp;quot;Fabio's work on:&lt;br /&gt;
 &lt;br /&gt;
Google Season of Code&lt;br /&gt;
Latam OWASP Tour&lt;br /&gt;
EU OWASP Tour&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:John.wilander John Wilander]||align=&amp;quot;center&amp;quot;|&amp;quot;John has done so much for OWASP over the years. He deeply supports our international community.&lt;br /&gt;
&lt;br /&gt;
* John founded OWASP Sweden in 2007 and stepped down 2013 with a mailing list of 900+ chapter members, combined under the Sweden umbrella.&lt;br /&gt;
&lt;br /&gt;
* John chaired OWASP AppSec Research 2010 in Stockholm with Microsoft and Google as main sponsors and keynote speakers. Managed to gather a great team/committee. The profit funded a big part of the subsequent Global Summit.&lt;br /&gt;
&lt;br /&gt;
* John organized and chaired the Browser Security Track at the Global Summit in Portugal 2011. Round table discussions with Mozilla, Google, Microsoft, PayPal, Adobe, IETF, and some of the world's best web hackers (Mario Heiderich, Stefano di Paola, Gareth Heyes, Eduardo Vela Nava, and David Lindsay).&lt;br /&gt;
&lt;br /&gt;
* John Co-championed the Builders-Breakers-Defenders communities within OWASP, took on the Builders' Developer Outreach, and went on a two-year mission to give appsec talks at developer conferences, not security conferences.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Mission Outreach – grow the OWASP community&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch]||align=&amp;quot;center&amp;quot;|&amp;quot;Martin tirelessly attends every OWASP conference and supports the OWASP booth. But he also does this at many, many conferences. For example at this year's FOSDEM, Blackhat EU and Hack in the Box Amsterdam. These efforts take a lot of personal time, as well as effort transporting OWASP materials to and from venues.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[[Fabio Cerullo]]||align=&amp;quot;center&amp;quot;|&amp;quot;Fabio has been doing an amazing work for OWASP for so many years now, silently, without asking anything in return. I first met him at Appsec EU 2011, which was a great success. We then worked together during OWASP's first year as a GSoC organization, an initiative that Fabio put a lot of effort in and was a great success. He has also successfully run the LatAm tour and now the EU tour, a couple of very large and complex events, with amazing success in spreading the OWASP word in the corresponding areas.&lt;br /&gt;
I believe that Fabio has provided amazing value to OWASP's mission, in an altruistic way, without pursuing promotion for himself or any other benefits. He's the most fitting for the &amp;quot;Best mission outreach&amp;quot; award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For his effort in the Latam Tour, spreading OWASP brand and awareness in Latin America and the OWASP European Tour!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:John.wilander John Wilander]||align=&amp;quot;center&amp;quot;|&amp;quot;John managed to stay a developer and had a massive influence on the developer community with his security knowledge. &lt;br /&gt;
He did this next to his OWASP global involvement at various OWASP conferences of one he organized himself and leading the Swedish chapter.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
*Best Innovator – willingness to try new ideas&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [[Tanoh Aka Marcellin]]||align=&amp;quot;center&amp;quot;|&amp;quot;la raison est que je voudrais lui faire gagner ce prix afin de pouvoir avoir accÃ¨s aux nouveaux outils et surtout pour ce faire des contacts avec le groupe OWASP et pourquoi pas si possible, travailler avec ce groupe merci.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]||align=&amp;quot;center&amp;quot;|&amp;quot;Abbas is developing a new php security library which seems very promising. There is no such a library yet and during the GSOC Abbas is working hard to implement this together as project leader with the student and volunteers &amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Rules:'''&lt;br /&gt;
&lt;br /&gt;
1. Board members can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
2. Paid staff can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
3. Must be a paid member to vote '''Not sure if you are a current member?''' [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0Ag5ZloRZ0SmjdFZILXhCRjQyMjVIRURhNFgzRVZ5aVE&amp;amp;hl=en#gid=0 Member Directory]&lt;br /&gt;
&lt;br /&gt;
4. All nominees will remain anonymous until August 19, 2013&lt;br /&gt;
&lt;br /&gt;
5. Anyone can nominate any individual&lt;br /&gt;
&lt;br /&gt;
6. One person per category may be nominated&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship Opportunities:''' Please see our [https://docs.google.com/a/owasp.org/document/d/1VDBZ4vnJ52XkB2MJ35PCdMUTbS8qFmChkL24-GsygtY/edit# Sponsorship Document] &lt;br /&gt;
&lt;br /&gt;
These awards are funded solely by sponsors.  If you or your company are interested in sponsoring this years WASPY Awards, please let us know by [http://www.tfaforms.com/274270 contacting us] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Information about last years WASPY Awards including our winner Helen Gao and our sponsors Qualys and Trustwave can be found here: https://www.owasp.org/index.php/WASPY_Awards'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; &amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''2013 Sponsors'''&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Platinum'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.qualys.com|logo=Qualys_Logo_For_WASPY_Resized.png}}&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Epsylon&amp;diff=157358</id>
		<title>User:Epsylon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Epsylon&amp;diff=157358"/>
				<updated>2013-08-26T16:28:51Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=150678</id>
		<title>OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=150678"/>
				<updated>2013-04-29T11:35:18Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: The Cross Site Scripting Framework''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Epsylon|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Roadmap &amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://sourceforge.net/projects/xsser/files/latest/download '''v1.6b - &amp;quot;Grey Swarm&amp;quot;''']&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://xsser.sf.net '''SF Website'''] &amp;lt;br&amp;gt; [http://sourceforge.net/projects/xsser/files/ '''Code Releases''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paper: 'XSS for fun and profit':&amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
=GSoC 2013 Proposal=&lt;br /&gt;
&lt;br /&gt;
[http://owasp.com/index.php/GSoC2013_Ideas#OWASP_XSSer_Project '''OWASP XSSer Project Ideas''']&lt;br /&gt;
&lt;br /&gt;
Students presentations, questions and more: [http://sourceforge.net/mailarchive/forum.php?forum_name=xsser-users '''Mailing list archive: GSoC13 thread''']&lt;br /&gt;
&lt;br /&gt;
Proposals 'on stage':&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.google-melange.com/gsoc/proposal/review/google/gsoc2013/mxprm/17001&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.google-melange.com/gsoc/proposal/review/google/gsoc2013/badc0re/1&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.google-melange.com/gsoc/proposal/review/google/gsoc2013/whenov/1&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
=Current Version=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;XSSer v1.6b (&amp;quot;The Mosquito: &amp;lt;u&amp;gt;Grey Swarm!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download original source code: [http://sourceforge.net/projects/xsser/files/xsser_1.6-1.tar.gz/download '''XSSer v1.6 -beta-''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ubuntu/Debian package: [http://xsser.sf.net/xsser/xsser-1.6_all.deb.tar.gz '''XSSer-1.6_all.deb''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ArchLinux package: [http://aur.archlinux.org/packages.php?ID=43447 '''AUR link (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Gentoo package: [http://perso.ikujam.org/xsser-1.6.1-ebuild.tar.gz '''XSSer Gentoo ebuild (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;RPM package: [http://xsser.sf.net/xsser/xsser-1.6-1.noarch.rpm.tar.gz '''XSSer-1.6-1.noarch.rpm''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Subversion- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;$ svn co https://xsser.svn.sourceforge.net/svnroot/xsser xsser&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface:&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-donate_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-donate.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-map_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-check_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-check.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-conn_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-conn.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
TIP: type: 'xsser --gtk' to start from shell. Or run directly XSSer from menu [[Image:xssericon_32x32.png]]&lt;br /&gt;
&lt;br /&gt;
=Installation=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms.  It requires Python and the following libraries:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-pycurl - Python bindings to libcurl&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-beautifulsoup - error-tolerant HTML parser for Python&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-libxml2 - Python bindings for the GNOME XML library&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-geoip - Python bindings for the GeoIP IP-to-country resolver library&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On Debian-based systems (ex: Ubuntu), run: &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    sudo apt-get install python-pycurl python-beautifulsoup python-libxml2 python-geoip&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=How to Use=&lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [-u  |-i  |-d ] [-g  |-p  |-c ] [Request(s)] [Vector(s)] [Bypasser(s)] [Technique(s)] [Final Injection(s)]&lt;br /&gt;
&lt;br /&gt;
  [http://xsser.sourceforge.net/#usage '''Usage'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#examples '''Examples'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#docs '''Documentation'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#screenshots '''Screenshots'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#videotutorials '''Videos'''] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Changelog=&lt;br /&gt;
&lt;br /&gt;
'''November, 28, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added Drop Cookie option + Added Random IP X-Forwarded-For option + Random X-Client-IP option + Added GSS and NTLM authentication methods + Added Ignore proxy option + Added TCP-NODELAY option + Added Follow redirects option + Added Follow redirects limiter parameter + Added Auto-HEAD precheck system + Added No-HEAD option + Added Isalive option + Added Check at url option (Blind XSS) + Added Reverse Check parameter + Added PHPIDS (v.0.6.5) exploit + Added More vectors to auto-payloading + Added HTML5 studied vectors + Fixed Different bugs on core + Fixed Curl handlerer options + Fixed Dorkerers system + Fixed Bugs on results propagation + Fixed POST requests.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Added New features to GTK controller + Added Detailed views to GTK interface.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 25, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added package for Archlinux.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 24, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added GTK option + Heuristic test + HTTP Response Splitting (ak.a Induced attack!) + DoS (Server) injection + Final code (added DCP &amp;amp; DOM injections) + Update option + Code clean + Bugfixing + New options menu + More advanced statistics system + Updated dorkerers list.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Intuitive navigation + Wizard helper (&amp;quot;build your pentesting answering some questions&amp;quot;) + Expert visor (with target(s) geolocation included + Documentation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 13, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XSSer package for Archlinux can be found in the AUR.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 11, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Created XSSer package (v1.0) for Ubuntu/Debian based systems.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 9, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added more advanced statistics results + Bugfixig.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 7, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;final remote injections&amp;quot; option + Cross Flash Attack! + Cross Frame Scripting + Data Control Protocol Injections + Base64 (rfc2397) PoC + OnMouseMove PoC + Browser launcher + Code clean + Bugfixing + New options menu + Pre-check system + Crawler spidering clones + More advanced statistics system + &amp;quot;Mana&amp;quot; output results.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October, 8, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POC: Detecting, exploiting and reporting &amp;quot;fcgi-bin/echo&amp;quot; Oracle vulnerability with XSSer&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
./XSSer -d &amp;quot;'inurl:fcgi-bin/echo'&amp;quot; --De &amp;quot;google&amp;quot; --proxy &amp;quot;http://127.0.0.1:8118&amp;quot; -s --tweet&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Results of the -botnet- attack in real time:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
- http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reported: apróx. 3.000 websites vulnerables (XSSer storm!!).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''September 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added a-xml exporter + ImageXSS + New dorker engines (total 10) + Core clean + Bugfixing + Social Networking XSS auto-publisher + Started -federated- XSS (full disclosure) pentesting botnet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August 20, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (26 new injections) + POST + Statistics + URL Shorteners + IP Octal + Post-processing payloading + DOM Shadows! + Cookie injector + Browser DoS (Denegation of Service).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 1, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dorking + Crawling + IP DWORD + Core clean.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''April 19, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTPS implemented + patched bugs.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;inject your own payload&amp;quot; option. Can be used with all character encoding -bypassers- of XSSer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 18, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (62 different XSS injections).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 16, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added new payload encoders to bypass filters. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
Download roadmap planning: [http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Mailing lists:'''&lt;br /&gt;
&lt;br /&gt;
    * Owasp: [https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] [mailto:owasp_xsser@lists.owasp.org '''Write''']&lt;br /&gt;
&lt;br /&gt;
    * Sourceforge: [https://lists.sourceforge.net/lists/listinfo/xsser-users '''Subscribe'''] [mailto:xsser-users@lists.sourceforge.net '''Write''']&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
  GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;br /&gt;
          o [https://twitter.com/lord_epsylon '''twitter.com''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2013_Ideas&amp;diff=148192</id>
		<title>GSoC2013 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2013_Ideas&amp;diff=148192"/>
				<updated>2013-03-19T23:39:21Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
===OWASP XSSer Project===&lt;br /&gt;
&lt;br /&gt;
XSSer has a correct engine implementation to search/exploit XSS vulnerabilities, but it is necessary to work on some different fields to obtain better results. Some of them are: to fight against &amp;quot;false positive&amp;quot; results, to implemenet a better human-readable output results and to develop some new features (like; CSSer, Code checks user inputs, etc...). Also, it will be nice to update the tool with more valid XSS vectors (DOM, DCP, reflected, etc...) and some &amp;quot;anti-anti-XSS&amp;quot; systems for more common browsers. &lt;br /&gt;
&lt;br /&gt;
There is a roadmap on a pdf file with all tasks required to advance to next release of 'XSSer' (v1.7b - Total Swarm!)&lt;br /&gt;
&lt;br /&gt;
Download: http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf &lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Below is shown a structure of phases and milestones code areas.&lt;br /&gt;
&lt;br /&gt;
Milestones:&lt;br /&gt;
    • Phase 1: Core:&lt;br /&gt;
        + Bugfixing:&lt;br /&gt;
             - False positives&lt;br /&gt;
             - Fix “swarm” results&lt;br /&gt;
             - Fix 'maximize' screen (bug reported)&lt;br /&gt;
             - Add auto-update revision&lt;br /&gt;
             - Fix multithreading (review)&lt;br /&gt;
             - Research 'glibc' corruption&lt;br /&gt;
&lt;br /&gt;
        + Add crawlering for POST+GET (auto test 'whole' page forms)&lt;br /&gt;
        + Update XSS payloads (vectors.py / DOM.py / DCP.py / etc...)&lt;br /&gt;
        + Advance Statistics results (show more detailed outputs)&lt;br /&gt;
        + Advance Exporting methods (create 'whitehat' reports (xml/json))&lt;br /&gt;
        + Advance “WebSockets” technology on XSSer 'fortune' option&lt;br /&gt;
        + Update Interface (GTK+)&lt;br /&gt;
&lt;br /&gt;
    • Phase 2: New features:&lt;br /&gt;
        + Add 'code pre-check' option: Users can set which code will return target's website, to try to evade false positive results.&lt;br /&gt;
        + Add 'CSSer' option: Payloads for CSS injections.&lt;br /&gt;
        + Research/Search anti-IDS/NIDS/IPS... codes to evade XSS filters.&lt;br /&gt;
        + BurpXSSer: Create a Burp plugin (with Jython libs)&lt;br /&gt;
        + ZAPXSSer: Create a ZAP plugin (with Jython libs)&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* To deploy a new stable version of XSSer with GTk+/Web/Shell main features working propertly,&lt;br /&gt;
&lt;br /&gt;
The code should be:&lt;br /&gt;
&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
XSSer is written in Python, so a good knowledge of this language is recommended, as is knowledge of HTML and Javascript. Also, is necessary to have some knowledge of application security and more in concret about XSS techniques.&lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Medium&lt;br /&gt;
&lt;br /&gt;
'''Mentor: epsylon (psy) - OWASP XSSer Project Leader'''&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP: Dynamically Configurable actions===&lt;br /&gt;
&lt;br /&gt;
ZAP provides various mechanisms which allow HTTP requests and responses to be changed dynamically. So (for example) a string in an HTTP request can automatically be changed to another string.&lt;br /&gt;
&lt;br /&gt;
It also supports a scripting interface, which is very powerful but at the moment difficult to use.&lt;br /&gt;
&lt;br /&gt;
This project would introduce something inbetween thess 2 options - a powerful way of defining (potentially) complex rules using a wizard based interface.&lt;br /&gt;
&lt;br /&gt;
The challenge will be to make it as usable as possible while still providing a wide range of functionality.&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
This component would provide a set of highly configurable 'actions' which the user would see up via a wizard.&lt;br /&gt;
&lt;br /&gt;
So they would initially define when the action applies, based on things like regex matching on request elements. And they should be able to define multiple criteria with ANDs and ORs.&lt;br /&gt;
&lt;br /&gt;
Then they would define the actions, which could include:&lt;br /&gt;
&lt;br /&gt;
* Changing the request (adding, removing or replacing strings)&lt;br /&gt;
* Raising alerts&lt;br /&gt;
* Breaking (to replace existing break points)&lt;br /&gt;
* Running custom scripts (which could do pretty much anything) &lt;br /&gt;
&lt;br /&gt;
They would then be able to switch the actions on and off from the full list of defined actions using checkboxes&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* A new ZAP add-on providing the above functionality&lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Simon Bennetts - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP: Enhanced HTTP Session Handling===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP can currently manage multiple sessions. This development would allow ZAP to better handle HTTP Sessions to provide different views of a given target depending on the different user's permissions that the targeted site supports.&lt;br /&gt;
&lt;br /&gt;
This implementation such provide a set of methods to answer questions such as: 1)What nodes(pages) are available to a group of users and not to other groups of users 2)What nodes are available to different users but these contain significant differences in the HTTP headers and/or in the body content.&lt;br /&gt;
&lt;br /&gt;
This will allow ZAP to be used to detect access control issues which would otherwise require manual testing.&lt;br /&gt;
Expected results:&lt;br /&gt;
&lt;br /&gt;
* ZAP will have an understanding of both users and roles and be able to associate them with HTTP sessions.&lt;br /&gt;
* The user will be able to associate credentials with different roles allowing ZAP to automatically authenticate as any user / role.&lt;br /&gt;
* ZAP will be able to spider an application using a given user/role.&lt;br /&gt;
* ZAP will be able to report the differences between different HTTP sessions.&lt;br /&gt;
* ZAP will be able to show different views of the site in the site's tree tab with the pages visible for each session.&lt;br /&gt;
* ZAP will be able to attack one session based on the URLs accessed in another session and report which appear to work. &lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
Users will be able to:&lt;br /&gt;
* specify exactly which alerts are included, by context, site or on an individual alert basis&lt;br /&gt;
* specify what information is included and how it is layed out&lt;br /&gt;
* specify a range of output formats, at least including HTML and PDF&lt;br /&gt;
* include details of what testing has been performed (automatically generated where possible)&lt;br /&gt;
* apply their own branding&lt;br /&gt;
* save report templates, and apply templates downloaded from the ZAP marketplace &lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML and the HTTP protocol specification. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Guifre Ruiz - OWASP ZAP Dev Team'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP: Advanced reporting===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The reports that ZAP generates are in a fixed format which is not particularly useful or attractive. This development would provide the user with a fine grained control over the contents, layout and branding of the reports.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
A new user interface for genrating reports which is easy to use and provides the user with a wide range of options.&lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Simon Bennetts - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP - SAML 2.0 Support===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
SAML 2.0 is an XML-based federated single sign-on (FSSO) protocol that uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, that is an identity provider, and a SAML consumer, that is a service provider. SAML 2.0 enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO). SAML specifications support many ways, called profiles and bindings, to generate and transport assertions between trusted entities The Web Browser SSO profile is of particular interest here since it enables web applications from 2 separate domains to leverage SSO easily by exchanging assertions via a web browser session.&lt;br /&gt;
&lt;br /&gt;
ZAP provides various mechanisms which allow HTTP requests and responses to be changed dynamically. This project will enhance those capabilities to be able to detect and fuzz various elements and attributes of a SAML Assertion.&lt;br /&gt;
&lt;br /&gt;
The scope of this project is limited to the following SAML bindings, profiles and protocols:&lt;br /&gt;
&lt;br /&gt;
Profiles :&lt;br /&gt;
* Web Browser SSO &lt;br /&gt;
&lt;br /&gt;
Bindings:&lt;br /&gt;
* HTTP POST&lt;br /&gt;
* HTTP Redirect &lt;br /&gt;
&lt;br /&gt;
Protocols:&lt;br /&gt;
* Authentication Request Protocol &lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This component would enable ZAP to:&lt;br /&gt;
* Detect SAML Assertions in HTTP requests and responses&lt;br /&gt;
* Decode SAML Assertions&lt;br /&gt;
* Fuzz various entities and attributes within a SAML assertion&lt;br /&gt;
* Re-encode the assertion and send it forward &lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
Users would have a choice either to fuzz the attributes within an assertion or just add/remove arbitrary attribute (to check for XML and SAML Schema Conformance).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML and SAML 2.0 Protocol. Some knowledge of application security would be useful, but not essential. Understanding of SSO and Federated SSO is preferred.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Prasad N. Shenoy'''&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Captcha_(OWASP-AT-008)&amp;diff=141067</id>
		<title>Testing for Captcha (OWASP-AT-008)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Captcha_(OWASP-AT-008)&amp;diff=141067"/>
				<updated>2012-12-12T03:14:10Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
CAPTCHA (&amp;quot;Completely Automated Public Turing test to tell Computers and Humans Apart&amp;quot;) is a type of challenge-response test used by many web applications to ensure that the response is not generated by a computer. CAPTCHA implementations are often vulnerable to various kinds of attacks even if the generated CAPTCHA is unbreakable.&lt;br /&gt;
This section will help you to identify these kinds of attacks.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
Although CAPTCHA is not an authentication control, its use can be very efficient against:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Testing_for_user_enumeration enumeration attacks] (login, registration or password reset forms are often vulnerable to enumeration attacks - without CAPTCHA the attacker can gain valid usernames, phone numbers or any other sensitive information in a short time)&lt;br /&gt;
* automated sending of many GET/POST requests in a short time where it is undesirable (e.g., SMS/MMS/email flooding), CAPTCHA provides a rate limiting function&lt;br /&gt;
* automated creation/using of the account that should be used only by humans (e.g., creating webmail accounts, stop spamming)&lt;br /&gt;
* automated posting to blogs, forums and wikis, whether as a result of commercial promotion, or harassment and vandalism&lt;br /&gt;
* any automated attacks that massively gain or misuse sensitive information from the application&lt;br /&gt;
&lt;br /&gt;
Using CAPTCHAs as a CSRF protection is not recommended (because there are [[Testing_for_CSRF  (OWASP-SM-005)|stronger CSRF countermeasures]]).&lt;br /&gt;
&lt;br /&gt;
These vulnerabilities are quite common in many CAPTCHA implementations:&lt;br /&gt;
&lt;br /&gt;
* generated image CAPTCHA is weak, this can be identified (without any complex computer recognition systems) only by a simple comparison with already broken CAPTCHAs &lt;br /&gt;
* generated CAPTCHA questions have a very limited set of possible answers &lt;br /&gt;
&lt;br /&gt;
* the value of decoded CAPTCHA is sent by the client (as a GET parameter or as a hidden field of POST form). This value is often: &lt;br /&gt;
** encrypted by simple algorithm and can be easily decrypted by observing of multiple decoded CAPTCHA values&lt;br /&gt;
** hashed by a weak hash function (e.g., MD5) that can be broken using a rainbow table&lt;br /&gt;
                                                                               &lt;br /&gt;
* possibility of replay attacks: &lt;br /&gt;
** the application does not keep track of what ID of CAPTCHA image is sent to the user. Therefore, the attacker can simply obtain an appropriate CAPTCHA image and its ID, solve it, and send the value of the decoded CAPTCHA with its corresponding ID (the ID of a CAPTCHA could be a hash of the decoded CAPTCHA or any unique identifier)  &lt;br /&gt;
** the application does not destroy the session when the correct phrase is entered - by reusing the session ID of a known CAPTCHA it is possible to bypass CAPTCHA protected page&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
Use an intercepting fault injection proxy (e.g., [[OWASP WebScarab Project|WebScarab]]) to:&lt;br /&gt;
&lt;br /&gt;
* identify all parameters that are sent in addition to the decoded CAPTCHA value from the client to the server (these parameters can contain encrypted or hashed values of decoded CAPTCHA and CAPTCHA ID number)&lt;br /&gt;
* try to send an old decoded CAPTCHA value with an old CAPTCHA ID (if the application accepts them, it is vulnerable to replay attacks)&lt;br /&gt;
* try to send an old decoded CAPTCHA value with an old session ID (if the application accepts them, it is vulnerable to replay attacks)&lt;br /&gt;
 &lt;br /&gt;
Find out if similar CAPTCHAs have already been broken. Broken CAPTCHA images can be found here [http://www.cs.sfu.ca/~mori/research/gimpy/ez/ gimpy], [http://libcaca.zoy.org/wiki/PWNtcha PWNtcha], and [http://www.lafdc.com/captcha/ lafdc].&lt;br /&gt;
&lt;br /&gt;
Verify if the set of possible answers for a CAPTCHA is limited and can be easily determined.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
&lt;br /&gt;
Audit the application source code in order to reveal: &lt;br /&gt;
&lt;br /&gt;
* used CAPTCHA implementation and version - there are many known vulnerabilities in widely used CAPTCHA implementations, see http://osvdb.org/search?request=captcha&lt;br /&gt;
* if the application sends encrypted or hashed value from the client (which is a very bad security practice) verify if used encryption or hash algorithm is sufficiently strong&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
'''Captcha Decoders'''&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://cintruder.sourceforge.net/ (Opensource) CaptchaIntruder]&lt;br /&gt;
* [http://libcaca.zoy.org/wiki/PWNtcha (Opensource) PWNtcha captcha decoder]&lt;br /&gt;
* [http://churchturing.org/captcha-dist/ (Opensource) The Captcha Breaker]&lt;br /&gt;
* [http://www.lafdc.com/captcha/ (Commercial) Captcha decoder]&lt;br /&gt;
* [http://www.captchakiller.com/ (Commercial - Free) Online Captcha Decoder] Free limited usage, enough for testing.&lt;br /&gt;
&lt;br /&gt;
'''Articles'''&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.cs.sfu.ca/~mori/research/gimpy/ Breaking a Visual CAPTCHA]&lt;br /&gt;
* [http://www.puremango.co.uk/cm_breaking_captcha_115.php Breaking CAPTCHAs Without Using OCR]&lt;br /&gt;
* [http://securesoftware.blogspot.com/2007/11/captcha-placebo-security-control-for.html Why CAPTCHA is not a security control for user authentication]&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135612</id>
		<title>OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135612"/>
				<updated>2012-09-10T19:13:26Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: The Cross Site Scripting Framework''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Epsylon|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Roadmap &amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://sourceforge.net/projects/xsser/files/latest/download '''v1.6b - &amp;quot;Grey Swarm&amp;quot;''']&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://xsser.sf.net '''SF Website'''] &amp;lt;br&amp;gt; [http://sourceforge.net/projects/xsser/files/ '''Code Releases''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paper: 'XSS for fun and profit':&amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
=Current Version=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;XSSer v1.6b (&amp;quot;The Mosquito: &amp;lt;u&amp;gt;Grey Swarm!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download original source code: [http://sourceforge.net/projects/xsser/files/xsser_1.6-1.tar.gz/download '''XSSer v1.6 -beta-''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ubuntu/Debian package: [http://xsser.sf.net/xsser/xsser-1.6_all.deb.tar.gz '''XSSer-1.6_all.deb''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ArchLinux package: [http://aur.archlinux.org/packages.php?ID=43447 '''AUR link (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Gentoo package: [http://perso.ikujam.org/xsser-1.6.1-ebuild.tar.gz '''XSSer Gentoo ebuild (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;RPM package: [http://xsser.sf.net/xsser/xsser-1.6-1.noarch.rpm.tar.gz '''XSSer-1.6-1.noarch.rpm''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Subversion- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;$ svn co https://xsser.svn.sourceforge.net/svnroot/xsser xsser&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface:&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-donate_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-donate.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-map_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-check_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-check.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-conn_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-conn.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
TIP: type: 'xsser --gtk' to start from shell. Or run directly XSSer from menu [[Image:xssericon_32x32.png]]&lt;br /&gt;
&lt;br /&gt;
=Installation=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms.  It requires Python and the following libraries:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-pycurl - Python bindings to libcurl&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-beautifulsoup - error-tolerant HTML parser for Python&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-libxml2 - Python bindings for the GNOME XML library&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-geoip - Python bindings for the GeoIP IP-to-country resolver library&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On Debian-based systems (ex: Ubuntu), run: &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    sudo apt-get install python-pycurl python-beautifulsoup python-libxml2 python-geoip&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=How to Use=&lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [-u  |-i  |-d ] [-g  |-p  |-c ] [Request(s)] [Vector(s)] [Bypasser(s)] [Technique(s)] [Final Injection(s)]&lt;br /&gt;
&lt;br /&gt;
  [http://xsser.sourceforge.net/#usage '''Usage'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#examples '''Examples'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#docs '''Documentation'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#screenshots '''Screenshots'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#videotutorials '''Videos'''] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Changelog=&lt;br /&gt;
&lt;br /&gt;
'''November, 28, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added Drop Cookie option + Added Random IP X-Forwarded-For option + Random X-Client-IP option + Added GSS and NTLM authentication methods + Added Ignore proxy option + Added TCP-NODELAY option + Added Follow redirects option + Added Follow redirects limiter parameter + Added Auto-HEAD precheck system + Added No-HEAD option + Added Isalive option + Added Check at url option (Blind XSS) + Added Reverse Check parameter + Added PHPIDS (v.0.6.5) exploit + Added More vectors to auto-payloading + Added HTML5 studied vectors + Fixed Different bugs on core + Fixed Curl handlerer options + Fixed Dorkerers system + Fixed Bugs on results propagation + Fixed POST requests.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Added New features to GTK controller + Added Detailed views to GTK interface.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 25, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added package for Archlinux.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 24, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added GTK option + Heuristic test + HTTP Response Splitting (ak.a Induced attack!) + DoS (Server) injection + Final code (added DCP &amp;amp; DOM injections) + Update option + Code clean + Bugfixing + New options menu + More advanced statistics system + Updated dorkerers list.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Intuitive navigation + Wizard helper (&amp;quot;build your pentesting answering some questions&amp;quot;) + Expert visor (with target(s) geolocation included + Documentation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 13, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XSSer package for Archlinux can be found in the AUR.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 11, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Created XSSer package (v1.0) for Ubuntu/Debian based systems.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 9, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added more advanced statistics results + Bugfixig.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 7, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;final remote injections&amp;quot; option + Cross Flash Attack! + Cross Frame Scripting + Data Control Protocol Injections + Base64 (rfc2397) PoC + OnMouseMove PoC + Browser launcher + Code clean + Bugfixing + New options menu + Pre-check system + Crawler spidering clones + More advanced statistics system + &amp;quot;Mana&amp;quot; output results.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October, 8, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POC: Detecting, exploiting and reporting &amp;quot;fcgi-bin/echo&amp;quot; Oracle vulnerability with XSSer&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
./XSSer -d &amp;quot;'inurl:fcgi-bin/echo'&amp;quot; --De &amp;quot;google&amp;quot; --proxy &amp;quot;http://127.0.0.1:8118&amp;quot; -s --tweet&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Results of the -botnet- attack in real time:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
- http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reported: apróx. 3.000 websites vulnerables (XSSer storm!!).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''September 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added a-xml exporter + ImageXSS + New dorker engines (total 10) + Core clean + Bugfixing + Social Networking XSS auto-publisher + Started -federated- XSS (full disclosure) pentesting botnet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August 20, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (26 new injections) + POST + Statistics + URL Shorteners + IP Octal + Post-processing payloading + DOM Shadows! + Cookie injector + Browser DoS (Denegation of Service).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 1, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dorking + Crawling + IP DWORD + Core clean.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''April 19, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTPS implemented + patched bugs.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;inject your own payload&amp;quot; option. Can be used with all character encoding -bypassers- of XSSer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 18, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (62 different XSS injections).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 16, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added new payload encoders to bypass filters. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
Download roadmap planning: [http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Mailing lists:'''&lt;br /&gt;
&lt;br /&gt;
    * Owasp: [https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] [mailto:owasp_xsser@lists.owasp.org '''Write''']&lt;br /&gt;
&lt;br /&gt;
    * Sourceforge: [https://lists.sourceforge.net/lists/listinfo/xsser-users '''Subscribe'''] [mailto:xsser-users@lists.sourceforge.net '''Write''']&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
  GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;br /&gt;
          o [https://twitter.com/lord_epsylon '''twitter.com''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_XSSER&amp;diff=135609</id>
		<title>Projects/OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_XSSER&amp;diff=135609"/>
				<updated>2012-09-10T17:15:02Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: The Cross Site Scripting Framework''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Epsylon|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Roadmap &amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://sourceforge.net/projects/xsser/files/latest/download '''v1.6b - &amp;quot;Grey Swarm&amp;quot;''']&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://xsser.sf.net '''SF Website'''] &amp;lt;br&amp;gt; [http://sourceforge.net/projects/xsser/files/ '''Code Releases''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paper: 'XSS for fun and profit':&amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
=Current Version=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;XSSer v1.6b (&amp;quot;The Mosquito: &amp;lt;u&amp;gt;Grey Swarm!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download original source code: [http://sourceforge.net/projects/xsser/files/xsser_1.6-1.tar.gz/download '''XSSer v1.6 -beta-''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ubuntu/Debian package: [http://xsser.sf.net/xsser/xsser-1.6_all.deb.tar.gz '''XSSer-1.6_all.deb''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ArchLinux package: [http://aur.archlinux.org/packages.php?ID=43447 '''AUR link (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Gentoo package: [http://perso.ikujam.org/xsser-1.6.1-ebuild.tar.gz '''XSSer Gentoo ebuild (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;RPM package: [http://xsser.sf.net/xsser/xsser-1.6-1.noarch.rpm.tar.gz '''XSSer-1.6-1.noarch.rpm''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Subversion- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;$ svn co https://xsser.svn.sourceforge.net/svnroot/xsser xsser&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface:&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-donate_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-donate.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-map_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-check_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-check.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-conn_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-conn.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
TIP: type: 'xsser --gtk' to start from shell. Or run directly XSSer from menu [[Image:xssericon_32x32.png]]&lt;br /&gt;
&lt;br /&gt;
=Installation=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms.  It requires Python and the following libraries:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-pycurl - Python bindings to libcurl&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-beautifulsoup - error-tolerant HTML parser for Python&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-libxml2 - Python bindings for the GNOME XML library&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-geoip - Python bindings for the GeoIP IP-to-country resolver library&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On Debian-based systems (ex: Ubuntu), run: &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    sudo apt-get install python-pycurl python-beautifulsoup python-libxml2 python-geoip&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=How to Use=&lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [-u  |-i  |-d ] [-g  |-p  |-c ] [Request(s)] [Vector(s)] [Bypasser(s)] [Technique(s)] [Final Injection(s)]&lt;br /&gt;
&lt;br /&gt;
  [http://xsser.sourceforge.net/#usage '''Usage'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#examples '''Examples'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#docs '''Documentation'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#screenshots '''Screenshots'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#videotutorials '''Videos'''] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Changelog=&lt;br /&gt;
&lt;br /&gt;
'''November, 28, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added Drop Cookie option + Added Random IP X-Forwarded-For option + Random X-Client-IP option + Added GSS and NTLM authentication methods + Added Ignore proxy option + Added TCP-NODELAY option + Added Follow redirects option + Added Follow redirects limiter parameter + Added Auto-HEAD precheck system + Added No-HEAD option + Added Isalive option + Added Check at url option (Blind XSS) + Added Reverse Check parameter + Added PHPIDS (v.0.6.5) exploit + Added More vectors to auto-payloading + Added HTML5 studied vectors + Fixed Different bugs on core + Fixed Curl handlerer options + Fixed Dorkerers system + Fixed Bugs on results propagation + Fixed POST requests.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Added New features to GTK controller + Added Detailed views to GTK interface.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 25, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added package for Archlinux.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 24, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added GTK option + Heuristic test + HTTP Response Splitting (ak.a Induced attack!) + DoS (Server) injection + Final code (added DCP &amp;amp; DOM injections) + Update option + Code clean + Bugfixing + New options menu + More advanced statistics system + Updated dorkerers list.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Intuitive navigation + Wizard helper (&amp;quot;build your pentesting answering some questions&amp;quot;) + Expert visor (with target(s) geolocation included + Documentation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 13, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XSSer package for Archlinux can be found in the AUR.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 11, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Created XSSer package (v1.0) for Ubuntu/Debian based systems.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 9, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added more advanced statistics results + Bugfixig.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 7, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;final remote injections&amp;quot; option + Cross Flash Attack! + Cross Frame Scripting + Data Control Protocol Injections + Base64 (rfc2397) PoC + OnMouseMove PoC + Browser launcher + Code clean + Bugfixing + New options menu + Pre-check system + Crawler spidering clones + More advanced statistics system + &amp;quot;Mana&amp;quot; output results.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October, 8, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POC: Detecting, exploiting and reporting &amp;quot;fcgi-bin/echo&amp;quot; Oracle vulnerability with XSSer&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
./XSSer -d &amp;quot;'inurl:fcgi-bin/echo'&amp;quot; --De &amp;quot;google&amp;quot; --proxy &amp;quot;http://127.0.0.1:8118&amp;quot; -s --tweet&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Results of the -botnet- attack in real time:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
- http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reported: apróx. 3.000 websites vulnerables (XSSer storm!!).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''September 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added a-xml exporter + ImageXSS + New dorker engines (total 10) + Core clean + Bugfixing + Social Networking XSS auto-publisher + Started -federated- XSS (full disclosure) pentesting botnet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August 20, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (26 new injections) + POST + Statistics + URL Shorteners + IP Octal + Post-processing payloading + DOM Shadows! + Cookie injector + Browser DoS (Denegation of Service).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 1, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dorking + Crawling + IP DWORD + Core clean.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''April 19, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTPS implemented + patched bugs.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;inject your own payload&amp;quot; option. Can be used with all character encoding -bypassers- of XSSer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 18, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (62 different XSS injections).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 16, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added new payload encoders to bypass filters. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
Download roadmap planning: [https://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Mailing lists:'''&lt;br /&gt;
&lt;br /&gt;
    * Owasp: [https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] [mailto:owasp_xsser@lists.owasp.org '''Write''']&lt;br /&gt;
&lt;br /&gt;
    * Sourceforge: [https://lists.sourceforge.net/lists/listinfo/xsser-users '''Subscribe'''] [mailto:xsser-users@lists.sourceforge.net '''Write''']&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
  GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;br /&gt;
          o [https://twitter.com/lord_epsylon '''twitter.com''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135076</id>
		<title>OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135076"/>
				<updated>2012-08-30T14:25:23Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: The Cross Site Scripting Framework''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Epsylon|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Roadmap &amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://sourceforge.net/projects/xsser/files/latest/download '''v1.6b - &amp;quot;Grey Swarm&amp;quot;''']&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://xsser.sf.net '''SF Website'''] &amp;lt;br&amp;gt; [http://sourceforge.net/projects/xsser/files/ '''Code Releases''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paper: 'XSS for fun and profit':&amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
=Current Version=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;XSSer v1.6b (&amp;quot;The Mosquito: &amp;lt;u&amp;gt;Grey Swarm!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download original source code: [http://sourceforge.net/projects/xsser/files/xsser_1.6-1.tar.gz/download '''XSSer v1.6 -beta-''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ubuntu/Debian package: [http://xsser.sf.net/xsser/xsser-1.6_all.deb.tar.gz '''XSSer-1.6_all.deb''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ArchLinux package: [http://aur.archlinux.org/packages.php?ID=43447 '''AUR link (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Gentoo package: [http://perso.ikujam.org/xsser-1.6.1-ebuild.tar.gz '''XSSer Gentoo ebuild (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;RPM package: [http://xsser.sf.net/xsser/xsser-1.6-1.noarch.rpm.tar.gz '''XSSer-1.6-1.noarch.rpm''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Subversion- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;$ svn co https://xsser.svn.sourceforge.net/svnroot/xsser xsser&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface:&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-donate_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-donate.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-map_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-check_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-check.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-conn_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-conn.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
TIP: type: 'xsser --gtk' to start from shell. Or run directly XSSer from menu [[Image:xssericon_32x32.png]]&lt;br /&gt;
&lt;br /&gt;
=Installation=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms.  It requires Python and the following libraries:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-pycurl - Python bindings to libcurl&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-beautifulsoup - error-tolerant HTML parser for Python&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-libxml2 - Python bindings for the GNOME XML library&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-geoip - Python bindings for the GeoIP IP-to-country resolver library&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On Debian-based systems (ex: Ubuntu), run: &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    sudo apt-get install python-pycurl python-beautifulsoup python-libxml2 python-geoip&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=How to Use=&lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [-u  |-i  |-d ] [-g  |-p  |-c ] [Request(s)] [Vector(s)] [Bypasser(s)] [Technique(s)] [Final Injection(s)]&lt;br /&gt;
&lt;br /&gt;
  [http://xsser.sourceforge.net/#usage '''Usage'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#examples '''Examples'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#docs '''Documentation'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#screenshots '''Screenshots'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#videotutorials '''Videos'''] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Changelog=&lt;br /&gt;
&lt;br /&gt;
'''November, 28, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added Drop Cookie option + Added Random IP X-Forwarded-For option + Random X-Client-IP option + Added GSS and NTLM authentication methods + Added Ignore proxy option + Added TCP-NODELAY option + Added Follow redirects option + Added Follow redirects limiter parameter + Added Auto-HEAD precheck system + Added No-HEAD option + Added Isalive option + Added Check at url option (Blind XSS) + Added Reverse Check parameter + Added PHPIDS (v.0.6.5) exploit + Added More vectors to auto-payloading + Added HTML5 studied vectors + Fixed Different bugs on core + Fixed Curl handlerer options + Fixed Dorkerers system + Fixed Bugs on results propagation + Fixed POST requests.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Added New features to GTK controller + Added Detailed views to GTK interface.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 25, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added package for Archlinux.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 24, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added GTK option + Heuristic test + HTTP Response Splitting (ak.a Induced attack!) + DoS (Server) injection + Final code (added DCP &amp;amp; DOM injections) + Update option + Code clean + Bugfixing + New options menu + More advanced statistics system + Updated dorkerers list.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Intuitive navigation + Wizard helper (&amp;quot;build your pentesting answering some questions&amp;quot;) + Expert visor (with target(s) geolocation included + Documentation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 13, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XSSer package for Archlinux can be found in the AUR.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 11, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Created XSSer package (v1.0) for Ubuntu/Debian based systems.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 9, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added more advanced statistics results + Bugfixig.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 7, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;final remote injections&amp;quot; option + Cross Flash Attack! + Cross Frame Scripting + Data Control Protocol Injections + Base64 (rfc2397) PoC + OnMouseMove PoC + Browser launcher + Code clean + Bugfixing + New options menu + Pre-check system + Crawler spidering clones + More advanced statistics system + &amp;quot;Mana&amp;quot; output results.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October, 8, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POC: Detecting, exploiting and reporting &amp;quot;fcgi-bin/echo&amp;quot; Oracle vulnerability with XSSer&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
./XSSer -d &amp;quot;'inurl:fcgi-bin/echo'&amp;quot; --De &amp;quot;google&amp;quot; --proxy &amp;quot;http://127.0.0.1:8118&amp;quot; -s --tweet&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Results of the -botnet- attack in real time:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
- http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reported: apróx. 3.000 websites vulnerables (XSSer storm!!).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''September 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added a-xml exporter + ImageXSS + New dorker engines (total 10) + Core clean + Bugfixing + Social Networking XSS auto-publisher + Started -federated- XSS (full disclosure) pentesting botnet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August 20, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (26 new injections) + POST + Statistics + URL Shorteners + IP Octal + Post-processing payloading + DOM Shadows! + Cookie injector + Browser DoS (Denegation of Service).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 1, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dorking + Crawling + IP DWORD + Core clean.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''April 19, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTPS implemented + patched bugs.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;inject your own payload&amp;quot; option. Can be used with all character encoding -bypassers- of XSSer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 18, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (62 different XSS injections).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 16, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added new payload encoders to bypass filters. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
Download roadmap planning: [https://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Mailing lists:'''&lt;br /&gt;
&lt;br /&gt;
    * Owasp: [https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] [mailto:owasp_xsser@lists.owasp.org '''Write''']&lt;br /&gt;
&lt;br /&gt;
    * Sourceforge: [https://lists.sourceforge.net/lists/listinfo/xsser-users '''Subscribe'''] [mailto:xsser-users@lists.sourceforge.net '''Write''']&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
  GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;br /&gt;
          o [https://twitter.com/lord_epsylon '''twitter.com''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Epsylon&amp;diff=135060</id>
		<title>User:Epsylon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Epsylon&amp;diff=135060"/>
				<updated>2012-08-30T09:12:08Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;br /&gt;
          o [https://twitter.com/lord_epsylon '''twitter.com''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/Owasp_XSSER/Roadmap&amp;diff=135059</id>
		<title>Projects/Owasp XSSER/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/Owasp_XSSER/Roadmap&amp;diff=135059"/>
				<updated>2012-08-30T09:09:04Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Main Project: [https://www.owasp.org/index.php/OWASP_XSSER '''Website''']&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download roadmap planning: [https://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135058</id>
		<title>OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135058"/>
				<updated>2012-08-30T09:08:13Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: The Cross Site Scripting Framework''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Devloop|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Roadmap &amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://sourceforge.net/projects/xsser/files/latest/download '''v1.6b - &amp;quot;Grey Swarm&amp;quot;''']&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://xsser.sf.net '''SF Website'''] &amp;lt;br&amp;gt; [http://sourceforge.net/projects/xsser/files/ '''Code Releases''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paper: 'XSS for fun and profit':&amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
=Current Version=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;XSSer v1.6b (&amp;quot;The Mosquito: &amp;lt;u&amp;gt;Grey Swarm!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download original source code: [http://sourceforge.net/projects/xsser/files/xsser_1.6-1.tar.gz/download '''XSSer v1.6 -beta-''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ubuntu/Debian package: [http://xsser.sf.net/xsser/xsser-1.6_all.deb.tar.gz '''XSSer-1.6_all.deb''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ArchLinux package: [http://aur.archlinux.org/packages.php?ID=43447 '''AUR link (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Gentoo package: [http://perso.ikujam.org/xsser-1.6.1-ebuild.tar.gz '''XSSer Gentoo ebuild (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;RPM package: [http://xsser.sf.net/xsser/xsser-1.6-1.noarch.rpm.tar.gz '''XSSer-1.6-1.noarch.rpm''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Subversion- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;$ svn co https://xsser.svn.sourceforge.net/svnroot/xsser xsser&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface:&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-donate_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-donate.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-map_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-check_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-check.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-conn_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-conn.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
TIP: type: 'xsser --gtk' to start from shell. Or run directly XSSer from menu [[Image:xssericon_32x32.png]]&lt;br /&gt;
&lt;br /&gt;
=Installation=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms.  It requires Python and the following libraries:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-pycurl - Python bindings to libcurl&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-beautifulsoup - error-tolerant HTML parser for Python&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-libxml2 - Python bindings for the GNOME XML library&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-geoip - Python bindings for the GeoIP IP-to-country resolver library&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On Debian-based systems (ex: Ubuntu), run: &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    sudo apt-get install python-pycurl python-beautifulsoup python-libxml2 python-geoip&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=How to Use=&lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [-u  |-i  |-d ] [-g  |-p  |-c ] [Request(s)] [Vector(s)] [Bypasser(s)] [Technique(s)] [Final Injection(s)]&lt;br /&gt;
&lt;br /&gt;
  [http://xsser.sourceforge.net/#usage '''Usage'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#examples '''Examples'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#docs '''Documentation'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#screenshots '''Screenshots'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#videotutorials '''Videos'''] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Changelog=&lt;br /&gt;
&lt;br /&gt;
'''November, 28, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added Drop Cookie option + Added Random IP X-Forwarded-For option + Random X-Client-IP option + Added GSS and NTLM authentication methods + Added Ignore proxy option + Added TCP-NODELAY option + Added Follow redirects option + Added Follow redirects limiter parameter + Added Auto-HEAD precheck system + Added No-HEAD option + Added Isalive option + Added Check at url option (Blind XSS) + Added Reverse Check parameter + Added PHPIDS (v.0.6.5) exploit + Added More vectors to auto-payloading + Added HTML5 studied vectors + Fixed Different bugs on core + Fixed Curl handlerer options + Fixed Dorkerers system + Fixed Bugs on results propagation + Fixed POST requests.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Added New features to GTK controller + Added Detailed views to GTK interface.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 25, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added package for Archlinux.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 24, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added GTK option + Heuristic test + HTTP Response Splitting (ak.a Induced attack!) + DoS (Server) injection + Final code (added DCP &amp;amp; DOM injections) + Update option + Code clean + Bugfixing + New options menu + More advanced statistics system + Updated dorkerers list.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Intuitive navigation + Wizard helper (&amp;quot;build your pentesting answering some questions&amp;quot;) + Expert visor (with target(s) geolocation included + Documentation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 13, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XSSer package for Archlinux can be found in the AUR.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 11, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Created XSSer package (v1.0) for Ubuntu/Debian based systems.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 9, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added more advanced statistics results + Bugfixig.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 7, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;final remote injections&amp;quot; option + Cross Flash Attack! + Cross Frame Scripting + Data Control Protocol Injections + Base64 (rfc2397) PoC + OnMouseMove PoC + Browser launcher + Code clean + Bugfixing + New options menu + Pre-check system + Crawler spidering clones + More advanced statistics system + &amp;quot;Mana&amp;quot; output results.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October, 8, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POC: Detecting, exploiting and reporting &amp;quot;fcgi-bin/echo&amp;quot; Oracle vulnerability with XSSer&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
./XSSer -d &amp;quot;'inurl:fcgi-bin/echo'&amp;quot; --De &amp;quot;google&amp;quot; --proxy &amp;quot;http://127.0.0.1:8118&amp;quot; -s --tweet&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Results of the -botnet- attack in real time:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
- http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reported: apróx. 3.000 websites vulnerables (XSSer storm!!).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''September 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added a-xml exporter + ImageXSS + New dorker engines (total 10) + Core clean + Bugfixing + Social Networking XSS auto-publisher + Started -federated- XSS (full disclosure) pentesting botnet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August 20, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (26 new injections) + POST + Statistics + URL Shorteners + IP Octal + Post-processing payloading + DOM Shadows! + Cookie injector + Browser DoS (Denegation of Service).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 1, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dorking + Crawling + IP DWORD + Core clean.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''April 19, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTPS implemented + patched bugs.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;inject your own payload&amp;quot; option. Can be used with all character encoding -bypassers- of XSSer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 18, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (62 different XSS injections).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 16, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added new payload encoders to bypass filters. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
Download roadmap planning: [https://xsser.sourceforge.net/xsser/xsser-roadmap.pdf '''Next Version''']&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Mailing lists:'''&lt;br /&gt;
&lt;br /&gt;
    * Owasp: [https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] [mailto:owasp_xsser@lists.owasp.org '''Write''']&lt;br /&gt;
&lt;br /&gt;
    * Sourceforge: [https://lists.sourceforge.net/lists/listinfo/xsser-users '''Subscribe'''] [mailto:xsser-users@lists.sourceforge.net '''Write''']&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
  GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;br /&gt;
          o [https://twitter.com/lord_epsylon '''twitter.com''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/Owasp_XSSER/Roadmap&amp;diff=135057</id>
		<title>Projects/Owasp XSSER/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/Owasp_XSSER/Roadmap&amp;diff=135057"/>
				<updated>2012-08-30T09:06:13Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xssericon_32x32.png&amp;diff=135056</id>
		<title>File:Xssericon 32x32.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xssericon_32x32.png&amp;diff=135056"/>
				<updated>2012-08-30T09:05:35Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm_sm.png&amp;diff=135055</id>
		<title>File:Xsser-greyswarm sm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm_sm.png&amp;diff=135055"/>
				<updated>2012-08-30T09:05:23Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-map_sm.png&amp;diff=135054</id>
		<title>File:Xsser-greyswarm-map sm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-map_sm.png&amp;diff=135054"/>
				<updated>2012-08-30T09:05:14Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-donate_sm.png&amp;diff=135053</id>
		<title>File:Xsser-greyswarm-donate sm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-donate_sm.png&amp;diff=135053"/>
				<updated>2012-08-30T09:05:02Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-conn_sm.png&amp;diff=135052</id>
		<title>File:Xsser-greyswarm-conn sm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-conn_sm.png&amp;diff=135052"/>
				<updated>2012-08-30T09:04:52Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-check_sm.png&amp;diff=135051</id>
		<title>File:Xsser-greyswarm-check sm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xsser-greyswarm-check_sm.png&amp;diff=135051"/>
				<updated>2012-08-30T09:04:35Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135050</id>
		<title>OWASP XSSER</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_XSSER&amp;diff=135050"/>
				<updated>2012-08-30T09:03:36Z</updated>
		
		<summary type="html">&lt;p&gt;Epsylon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project]]&lt;br /&gt;
{{Social Media Links}}&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''OWASP XSSer Project'''&amp;lt;br&amp;gt;Web application vulnerability scanner / Security auditor  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''XSSer: The Cross Site Scripting Framework''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Cross Site &amp;quot;Scripter&amp;quot; is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Devloop|'''psy''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Roadmap &amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/xsser-roadmap-v1_7b.pdf '''Next Version''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] - [mailto:owasp_xsser@lists.owasp.org '''Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|License&amp;lt;br&amp;gt;[http://gplv3.fsf.org/ '''GNU GPLv3''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Pentesting tool''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Support&amp;lt;br&amp;gt;[http://www.nlnet.nl/news/2010/20100623-awards.html '''NLNet Awards''']&amp;lt;br&amp;gt;[http://en.wikipedia.org/wiki/OWASP '''OWASP tool''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Documentation''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://sourceforge.net/projects/xsser/files/latest/download '''v1.6b - &amp;quot;Grey Swarm&amp;quot;''']&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[http://xsser.sf.net '''SF Website'''] &amp;lt;br&amp;gt; [http://sourceforge.net/projects/xsser/files/ '''Code Releases''']&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paper: 'XSS for fun and profit':&amp;lt;br&amp;gt;[http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(english).pdf '''English'''] - [http://xsser.sourceforge.net/xsser/XSS_for_fun_and_profit_SCG09_(spanish).pdf '''Spanish''']&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
=Current Version=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;XSSer v1.6b (&amp;quot;The Mosquito: &amp;lt;u&amp;gt;Grey Swarm!&amp;lt;/u&amp;gt;&amp;quot;)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Download original source code: [http://sourceforge.net/projects/xsser/files/xsser_1.6-1.tar.gz/download '''XSSer v1.6 -beta-''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ubuntu/Debian package: [http://xsser.sf.net/xsser/xsser-1.6_all.deb.tar.gz '''XSSer-1.6_all.deb''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ArchLinux package: [http://aur.archlinux.org/packages.php?ID=43447 '''AUR link (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Gentoo package: [http://perso.ikujam.org/xsser-1.6.1-ebuild.tar.gz '''XSSer Gentoo ebuild (v1.6b)''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;RPM package: [http://xsser.sf.net/xsser/xsser-1.6-1.noarch.rpm.tar.gz '''XSSer-1.6-1.noarch.rpm''']&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Or update your copy directly from the XSSer -Subversion- repository:&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;$ svn co https://xsser.svn.sourceforge.net/svnroot/xsser xsser&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
This version include more features on the GTK+ interface:&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-donate_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-donate.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-map_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-map.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-check_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-check.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:xsser-greyswarm-conn_sm.png]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://xsser.sf.net/xsser/xsser-greyswarm-conn.png '''+ Click for Zoom''']]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
TIP: type: 'xsser --gtk' to start from shell. Or run directly XSSer from menu [[Image:xssericon_32x32.png]]&lt;br /&gt;
&lt;br /&gt;
=Installation=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
XSSer runs on many platforms.  It requires Python and the following libraries:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-pycurl - Python bindings to libcurl&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    - python-beautifulsoup - error-tolerant HTML parser for Python&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-libxml2 - Python bindings for the GNOME XML library&amp;lt;br&amp;gt;&lt;br /&gt;
    - python-geoip - Python bindings for the GeoIP IP-to-country resolver library&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On Debian-based systems (ex: Ubuntu), run: &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    sudo apt-get install python-pycurl python-beautifulsoup python-libxml2 python-geoip&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=How to Use=&lt;br /&gt;
&lt;br /&gt;
xsser [OPTIONS] [-u  |-i  |-d ] [-g  |-p  |-c ] [Request(s)] [Vector(s)] [Bypasser(s)] [Technique(s)] [Final Injection(s)]&lt;br /&gt;
&lt;br /&gt;
  [http://xsser.sourceforge.net/#usage '''Usage'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#examples '''Examples'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#docs '''Documentation'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#screenshots '''Screenshots'''] &amp;lt;br&amp;gt;&lt;br /&gt;
  [http://xsser.sourceforge.net/#videotutorials '''Videos'''] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Changelog=&lt;br /&gt;
&lt;br /&gt;
'''November, 28, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added Drop Cookie option + Added Random IP X-Forwarded-For option + Random X-Client-IP option + Added GSS and NTLM authentication methods + Added Ignore proxy option + Added TCP-NODELAY option + Added Follow redirects option + Added Follow redirects limiter parameter + Added Auto-HEAD precheck system + Added No-HEAD option + Added Isalive option + Added Check at url option (Blind XSS) + Added Reverse Check parameter + Added PHPIDS (v.0.6.5) exploit + Added More vectors to auto-payloading + Added HTML5 studied vectors + Fixed Different bugs on core + Fixed Curl handlerer options + Fixed Dorkerers system + Fixed Bugs on results propagation + Fixed POST requests.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Added New features to GTK controller + Added Detailed views to GTK interface.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 25, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added package for Archlinux.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''February, 24, 2011:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Core: Added GTK option + Heuristic test + HTTP Response Splitting (ak.a Induced attack!) + DoS (Server) injection + Final code (added DCP &amp;amp; DOM injections) + Update option + Code clean + Bugfixing + New options menu + More advanced statistics system + Updated dorkerers list.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GTK: Intuitive navigation + Wizard helper (&amp;quot;build your pentesting answering some questions&amp;quot;) + Expert visor (with target(s) geolocation included + Documentation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 13, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XSSer package for Archlinux can be found in the AUR.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 11, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Created XSSer package (v1.0) for Ubuntu/Debian based systems.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 9, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added more advanced statistics results + Bugfixig.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''November, 7, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;final remote injections&amp;quot; option + Cross Flash Attack! + Cross Frame Scripting + Data Control Protocol Injections + Base64 (rfc2397) PoC + OnMouseMove PoC + Browser launcher + Code clean + Bugfixing + New options menu + Pre-check system + Crawler spidering clones + More advanced statistics system + &amp;quot;Mana&amp;quot; output results.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October, 8, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POC: Detecting, exploiting and reporting &amp;quot;fcgi-bin/echo&amp;quot; Oracle vulnerability with XSSer&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
./XSSer -d &amp;quot;'inurl:fcgi-bin/echo'&amp;quot; --De &amp;quot;google&amp;quot; --proxy &amp;quot;http://127.0.0.1:8118&amp;quot; -s --tweet&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Results of the -botnet- attack in real time:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
- http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reported: apróx. 3.000 websites vulnerables (XSSer storm!!).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''September 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added a-xml exporter + ImageXSS + New dorker engines (total 10) + Core clean + Bugfixing + Social Networking XSS auto-publisher + Started -federated- XSS (full disclosure) pentesting botnet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://identi.ca/xsserbot01&amp;lt;br&amp;gt;&lt;br /&gt;
http://twitter.com/xsserbot01&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''August 20, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (26 new injections) + POST + Statistics + URL Shorteners + IP Octal + Post-processing payloading + DOM Shadows! + Cookie injector + Browser DoS (Denegation of Service).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 1, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dorking + Crawling + IP DWORD + Core clean.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''April 19, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTPS implemented + patched bugs.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 22, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added &amp;quot;inject your own payload&amp;quot; option. Can be used with all character encoding -bypassers- of XSSer.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 18, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added attack payloads to auto-payloader (62 different XSS injections).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 16, 2010:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Added new payload encoders to bypass filters. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
Download roadmap planning: [https://xsser.sourceforge.net/xsser/xsser-roadmap-v1_7b.pdf '''Next Version''']&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
'''Irc:''' &lt;br /&gt;
&lt;br /&gt;
    * irc.freenode.net - channel: ''#xsser''&lt;br /&gt;
&lt;br /&gt;
'''Mailing lists:'''&lt;br /&gt;
&lt;br /&gt;
    * Owasp: [https://lists.owasp.org/mailman/listinfo/owasp_xsser '''Subscribe'''] [mailto:owasp_xsser@lists.owasp.org '''Write''']&lt;br /&gt;
&lt;br /&gt;
    * Sourceforge: [https://lists.sourceforge.net/lists/listinfo/xsser-users '''Subscribe'''] [mailto:xsser-users@lists.sourceforge.net '''Write''']&lt;br /&gt;
&lt;br /&gt;
'''Project Leader:'''&lt;br /&gt;
&lt;br /&gt;
  GPG ID: ''0xB8AC3776''&lt;br /&gt;
&lt;br /&gt;
    * Website:&lt;br /&gt;
          o [http://lordepsylon.net '''http://lordepsylon.net''']&lt;br /&gt;
&lt;br /&gt;
    * Email:&lt;br /&gt;
          o [mailto:root@lordepsylon.net '''psy''']&lt;br /&gt;
          o [mailto:epsylon@riseup,net '''epsylon''']&lt;br /&gt;
&lt;br /&gt;
    * Microblogging:&lt;br /&gt;
          o [https://identi.ca/psy '''identi.ca''']&lt;br /&gt;
          o [https://twitter.com/lord_epsylon '''twitter.com''']&lt;/div&gt;</summary>
		<author><name>Epsylon</name></author>	</entry>

	</feed>