<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Munir+Njiru</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Munir+Njiru"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Munir_Njiru"/>
		<updated>2026-04-29T06:42:54Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219343</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219343"/>
				<updated>2016-07-26T13:06:02Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''28th- 29th July 2016''' - 3rd Annual Africahackon conference. You can download the conference program here[http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf]&lt;br /&gt;
&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015'''&lt;br /&gt;
&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
=Africahackon 2016= &lt;br /&gt;
'''Event Date: 28th -29th July 2016'''&lt;br /&gt;
&lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
Download the Conference Program [http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf].&lt;br /&gt;
&lt;br /&gt;
Get the tickets here [https://www.ticketsasa.com/events/eventdetail/view/2062/index.php https://www.ticketsasa.com/events/eventdetail/view/2062/index.php].&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219342</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219342"/>
				<updated>2016-07-26T13:05:47Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''28th- 29th July 2016''' - 3rd Annual Africahackon conference. You can download the conference program here[http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf]&lt;br /&gt;
&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015'''&lt;br /&gt;
&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
=Africahackon 2016= &lt;br /&gt;
'''Event Date: 28th -29th July 2016'''&lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
Download the Conference Program [http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf].&lt;br /&gt;
&lt;br /&gt;
Get the tickets here [https://www.ticketsasa.com/events/eventdetail/view/2062/index.php https://www.ticketsasa.com/events/eventdetail/view/2062/index.php].&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219341</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219341"/>
				<updated>2016-07-26T13:05:16Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''28th- 29th July 2016''' - 3rd Annual Africahackon conference. You can download the conference program here[http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf]&lt;br /&gt;
&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015'''&lt;br /&gt;
&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
=Africahackon 2016= &lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
Download the Conference Program [http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf].&lt;br /&gt;
&lt;br /&gt;
Get the tickets here [https://www.ticketsasa.com/events/eventdetail/view/2062/index.php https://www.ticketsasa.com/events/eventdetail/view/2062/index.php].&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219340</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219340"/>
				<updated>2016-07-26T13:03:46Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''28th- 29th July 2016''' - 3rd Annual Africahackon conference. You can download the conference program here[http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf]&lt;br /&gt;
&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015'''&lt;br /&gt;
&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
=Africahackon 2016= &lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
Download the [http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf Conference Program].&lt;br /&gt;
&lt;br /&gt;
Get the tickets [https://www.ticketsasa.com/events/eventdetail/view/2062/index.php https://www.ticketsasa.com/events/eventdetail/view/2062/index.php here].&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219338</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219338"/>
				<updated>2016-07-26T13:01:07Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''28th- 29th July 2016''' - 3rd Annual Africahackon conference. You can download the conference program here[http://africahackon.com/wp-content/uploads/2016/07/AfricaHackOn-3rd-Conference-Schedule-2016-latest.pdf]&lt;br /&gt;
&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015'''&lt;br /&gt;
&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219337</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=219337"/>
				<updated>2016-07-26T11:57:46Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''28th- 29th July 2016''' - 3rd Annual Africahackon conference. &lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015'''&lt;br /&gt;
&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212736</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212736"/>
				<updated>2016-04-08T12:30:59Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Videos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* Cookie Theft Database Module for potency in stored XSS attacks. &lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
View the videos tab for an up to date list of videos.&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== Mailing List== &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-mth3l3m3nt-framework-project Mailing List]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Apr-04-2016: Added a cookie theft database module to enable XSS attacks become more potent. &lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Using-The-Cookie-Theft-Module Using the Cookie Theft Module]&lt;br /&gt;
&lt;br /&gt;
= Videos =&lt;br /&gt;
* [https://www.youtube.com/watch?v=ETnAmV3dxRE OWASP Mth3l3m3nt Framework vs bWAPP (Stored XSS Case)]&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OWASP Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OWASP Mth3l3m3nt Framework Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OWASP Mth3l3m3nt Framework Linux Installation]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. A special thanks should be in order for the Pentest-tools team that inspired the Cookie theft module. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212735</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212735"/>
				<updated>2016-04-08T12:30:01Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Videos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* Cookie Theft Database Module for potency in stored XSS attacks. &lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project#Videos_2 Click Here for Videos]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== Mailing List== &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-mth3l3m3nt-framework-project Mailing List]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Apr-04-2016: Added a cookie theft database module to enable XSS attacks become more potent. &lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Using-The-Cookie-Theft-Module Using the Cookie Theft Module]&lt;br /&gt;
&lt;br /&gt;
= Videos =&lt;br /&gt;
* [https://www.youtube.com/watch?v=ETnAmV3dxRE OWASP Mth3l3m3nt Framework vs bWAPP (Stored XSS Case)]&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OWASP Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OWASP Mth3l3m3nt Framework Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OWASP Mth3l3m3nt Framework Linux Installation]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. A special thanks should be in order for the Pentest-tools team that inspired the Cookie theft module. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212734</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212734"/>
				<updated>2016-04-08T12:29:13Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Videos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* Cookie Theft Database Module for potency in stored XSS attacks. &lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
View the Videos tab for an up to date list of videos in relation to Mth3l3m3nt &lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== Mailing List== &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-mth3l3m3nt-framework-project Mailing List]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Apr-04-2016: Added a cookie theft database module to enable XSS attacks become more potent. &lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Using-The-Cookie-Theft-Module Using the Cookie Theft Module]&lt;br /&gt;
&lt;br /&gt;
= Videos =&lt;br /&gt;
* [https://www.youtube.com/watch?v=ETnAmV3dxRE OWASP Mth3l3m3nt Framework vs bWAPP (Stored XSS Case)]&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OWASP Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OWASP Mth3l3m3nt Framework Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OWASP Mth3l3m3nt Framework Linux Installation]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. A special thanks should be in order for the Pentest-tools team that inspired the Cookie theft module. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212733</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212733"/>
				<updated>2016-04-08T12:27:53Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* Cookie Theft Database Module for potency in stored XSS attacks. &lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
View the Videos tab for an up to date list of videos in relation to Mth3l3m3nt &lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== Mailing List== &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-mth3l3m3nt-framework-project Mailing List]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Apr-04-2016: Added a cookie theft database module to enable XSS attacks become more potent. &lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Using-The-Cookie-Theft-Module Using the Cookie Theft Module]&lt;br /&gt;
&lt;br /&gt;
= Videos =&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. A special thanks should be in order for the Pentest-tools team that inspired the Cookie theft module. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212732</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212732"/>
				<updated>2016-04-08T12:24:44Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* Cookie Theft Database Module for potency in stored XSS attacks. &lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== Mailing List== &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-mth3l3m3nt-framework-project Mailing List]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Apr-04-2016: Added a cookie theft database module to enable XSS attacks become more potent. &lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Using-The-Cookie-Theft-Module Using the Cookie Theft Module]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. A special thanks should be in order for the Pentest-tools team that inspired the Cookie theft module. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212731</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=212731"/>
				<updated>2016-04-08T12:23:56Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* Cookie Theft Database Module for potency in stored XSS attacks. &lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== Mailing List== &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-mth3l3m3nt-framework-project Mailing List]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Apr-04-2016: Added a cookie theft database module to enable XSS attacks become more potent. &lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Using-The-Cookie-Theft-Module Using the Cookie Theft Module]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=211406</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=211406"/>
				<updated>2016-03-18T13:53:11Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015'''&lt;br /&gt;
&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=211405</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=211405"/>
				<updated>2016-03-18T13:49:18Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
'''20th-21st November 2015&lt;br /&gt;
'''Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed&lt;br /&gt;
====Security Events====&lt;br /&gt;
&lt;br /&gt;
=Multimedia University Bootcamp 2016= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at Multimedia University of Kenya (MMU) this year on 1st &amp;amp; 2nd of April. This marks the first Bootcamp at the University in the series of bootcamps across local universities. It will aim to raise more security aware individuals as they join the fields in development, forensics, offensive security etc. The key topics to be covered are: &lt;br /&gt;
&lt;br /&gt;
* Linux 101&lt;br /&gt;
* Google Hacking &lt;br /&gt;
* Android Forensics&lt;br /&gt;
* Network Security&lt;br /&gt;
* Web Security&lt;br /&gt;
* GSM Security&lt;br /&gt;
* Malware Analysis&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=211404</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=211404"/>
				<updated>2016-03-18T13:42:24Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''1st- 2nd April 2016''' - OWASP Kenyan Chapter and Africahackon will be holding a bootcamp at Multimedia University of Kenya in line with the plan to get information security to the young at heart so that we have more professionals in industry. &lt;br /&gt;
&lt;br /&gt;
20th-21st November 2015&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed &lt;br /&gt;
====Security Events====&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
=TUK Bootcamp= &lt;br /&gt;
Africahackon will be holding a series of bootcamps in relation to security.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=208547</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=208547"/>
				<updated>2016-02-12T06:15:59Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== Mailing List== &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-mth3l3m3nt-framework-project Mailing List]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=204782</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=204782"/>
				<updated>2015-12-07T09:24:20Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=204781</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=204781"/>
				<updated>2015-12-07T09:23:38Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Updates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Nov-30-2015: Created and Updated [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=204776</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=204776"/>
				<updated>2015-12-07T09:21:10Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
==Project Website==&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/ Project Website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
* [http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/framework-docs/ Developer Guide]&lt;br /&gt;
&lt;br /&gt;
==Issue Tracker==&lt;br /&gt;
[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/issues Submit Issues/Bugs/Feature Requests]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203832</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203832"/>
				<updated>2015-11-25T13:40:41Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Videos==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA OMF in Africahackon 2015 CTF]&lt;br /&gt;
* [https://www.youtube.com/watch?v=QjBbrNtCx3A OMF Windows Installation]&lt;br /&gt;
* [https://www.youtube.com/watch?v=_Nw05Q3fc2A OMF Linux Installation]&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation of OMF on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Nginx) Installation of OMF on Linux running Nginx]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Lighttpd) Installation of OMF on Linux running Lighttpd]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation of OMF on Windows running Apache]&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payloads-Module Using the Payloads Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Generic-Requests-Module Using the Generic Requests Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Shell-Generator-Module Using the Shell Generator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Payload-Encoder-&amp;amp;-Decoder-Modules Using the Payload Encoder &amp;amp; Decoder Modules]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Client-Side-Obfuscator-Module Using the Client Side Obfuscator Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/String-Tools-Module Using the String Tools Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/LFI-Exploits-Module Using the LFI Exploit Module]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Web-Herd-Module-(HTTP-Bot) Using the Web Herd Module (HTTP Bot)]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI Exploit Plugins]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203577</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203577"/>
				<updated>2015-11-19T15:16:49Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI exploits]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/HEAD/TRACE/OPTIONS/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203576</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203576"/>
				<updated>2015-11-19T15:15:56Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI exploits]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203575</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203575"/>
				<updated>2015-11-19T15:15:23Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX,CFM)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/HEAD/TRACE/OPTIONS/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI exploits]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203574</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203574"/>
				<updated>2015-11-19T15:14:23Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Updates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-18-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/commit/55e0a9bb38c5d29eaf6034ba9a8c1c0e07c3d2fc CVE-2015-7254 Exploit] to the framework.&lt;br /&gt;
* Nov-19-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI exploits]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203573</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203573"/>
				<updated>2015-11-19T15:12:14Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-09-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI exploits]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203572</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203572"/>
				<updated>2015-11-19T15:11:02Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-09-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
Welcome to the OWASP Mth3l3m3nt framework User Guide, Here you will find a few tutorials on how to use and configure the system and make it better.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
 &lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI exploits]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203570</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=203570"/>
				<updated>2015-11-19T15:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
* Nov-09-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki User Guide] to the Git Repository&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= User Guide =&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/WebServer-Configuration Initial WebServer Configuration]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Linux-(Apache) Installation on Linux running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Installation-Windows-(Apache) Installation on Windows running Apache]&lt;br /&gt;
*[https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/wiki/Developing-LFI-Plugins-(Exploits) Developing LFI exploits]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads.&lt;br /&gt;
* Client Side Obfuscator&lt;br /&gt;
* String Tools &lt;br /&gt;
* Whois &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mth3l3m3nt-dashboard.PNG&amp;diff=203527</id>
		<title>File:Mth3l3m3nt-dashboard.PNG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mth3l3m3nt-dashboard.PNG&amp;diff=203527"/>
				<updated>2015-11-18T11:49:16Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: Munir Njiru uploaded a new version of &amp;amp;quot;File:Mth3l3m3nt-dashboard.PNG&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=203344</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=203344"/>
				<updated>2015-11-13T10:07:02Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
20th-21st November 2015&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed &lt;br /&gt;
====Security Events====&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website] The schedule of topics to be taught that day can be downloaded [http://www.africahackon.com/assets/bootcamps/Bootcamp_Schedule_JKUAT.pdf here].&lt;br /&gt;
&lt;br /&gt;
=TUK Bootcamp= &lt;br /&gt;
Africahackon will be holding a series of bootcamps in relation to security.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=203343</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=203343"/>
				<updated>2015-11-13T09:52:28Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Security Happenings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
20th-21st November 2015&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed &lt;br /&gt;
====Security Events====&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website]&lt;br /&gt;
&lt;br /&gt;
=TUK Bootcamp= &lt;br /&gt;
Africahackon will be holding a series of bootcamps in relation to security.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=203342</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=203342"/>
				<updated>2015-11-13T09:52:07Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
20th-21st November 2015&lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed &lt;br /&gt;
====Security Happenings====&lt;br /&gt;
=JKUAT Bootcamp 2015= &lt;br /&gt;
Africahackon and OWASP Kenyan Chapter are holding a bootcamp at JKUAT (Jommo Kenyatta University of Agriculture &amp;amp; Technology) University this year. This marks it as the second bootcamp to grace the university. For more information on the training sessions taking place visit the [http://africahackon.com/africa/training Africahackon Website]&lt;br /&gt;
&lt;br /&gt;
=TUK Bootcamp= &lt;br /&gt;
Africahackon will be holding a series of bootcamps in relation to security.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=200516</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=200516"/>
				<updated>2015-09-14T11:07:09Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [mailto:Munir.Njiru@owasp.org Munir Njenga] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
&lt;br /&gt;
[[File:TUK-Bootcamp.jpg]]&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed &lt;br /&gt;
====Security Happenings====&lt;br /&gt;
&lt;br /&gt;
=TUK Bootcamp= &lt;br /&gt;
Africahackon will be holding a series of bootcamps in relation to security.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=200514</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=200514"/>
				<updated>2015-09-14T11:05:54Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [mailto:Munir.Njiru@owasp.org Munir Njenga] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
'''TUK Bootcamp 2015 (25th-26th September)'''&lt;br /&gt;
[[File:TUK-Bootcamp.jpg]]&lt;br /&gt;
&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
overed &lt;br /&gt;
====Security Happenings====&lt;br /&gt;
&lt;br /&gt;
=TUK Bootcamp= &lt;br /&gt;
Africahackon will be holding a series of bootcamps in relation to security.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=200512</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=200512"/>
				<updated>2015-09-14T11:03:43Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [mailto:Munir.Njiru@owasp.org Munir Njenga] and [mailto:Alex.mathenge@owasp.org Alex Mathenge] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
&lt;br /&gt;
====Security Happenings====&lt;br /&gt;
=TUK Bootcamp=&lt;br /&gt;
[[File:TUK-Bootcamp.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Africahackon 2015=&lt;br /&gt;
&lt;br /&gt;
This Year the 2nd Africahackon Conference is happening on 31st July 2015 at the Ihub and OWASP Kenyan Chapter will be there, will you? .  &lt;br /&gt;
&lt;br /&gt;
For more information, Visit the [http://www.africahackon.com Africahackon Website]&lt;br /&gt;
&lt;br /&gt;
Tickets can Be purchased [https://www.ticketsasa.com/events/eventdetail/view/1629/africahackon_2015 here]&lt;br /&gt;
&lt;br /&gt;
=About Africahackon=&lt;br /&gt;
&lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
AfricaHackOn houses not just ICT professionals but architects, electrical engineers, designers and business professionals. We have fun at what we do and boast of having a golden opportunity to shape the Information Security space across the continent.&lt;br /&gt;
&lt;br /&gt;
=TUK Bootcamp=&lt;br /&gt;
 &lt;br /&gt;
Africahackon will be holding a bootcamp on the 25th - 26th September. Book your slot now&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:TUK-Bootcamp.jpg&amp;diff=200511</id>
		<title>File:TUK-Bootcamp.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:TUK-Bootcamp.jpg&amp;diff=200511"/>
				<updated>2015-09-14T11:01:39Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: TUK Bootcamp Banner 25th-26th September 2015&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;TUK Bootcamp Banner 25th-26th September 2015&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=200503</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=200503"/>
				<updated>2015-09-14T06:44:49Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Updates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=200502</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=200502"/>
				<updated>2015-09-14T06:44:17Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/OWASP-mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199053</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199053"/>
				<updated>2015-08-13T14:38:07Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/mth3l3m3nt-framework/tree/master/dev-docs Developer Documentation] to the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199052</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199052"/>
				<updated>2015-08-13T14:36:48Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
==Updates==&lt;br /&gt;
* Aug-13-2015: Added [https://github.com/alienwithin/mth3l3m3nt-framework/tree/master/dev-docs Technical Documentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199048</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199048"/>
				<updated>2015-08-13T10:38:03Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Munir_Njiru&amp;diff=199047</id>
		<title>User:Munir Njiru</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Munir_Njiru&amp;diff=199047"/>
				<updated>2015-08-13T10:36:29Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Munir_Njiru_Profile_Picture.JPG]]&lt;br /&gt;
&lt;br /&gt;
'''About Me:'''&lt;br /&gt;
&lt;br /&gt;
I am a Cyber Security Consultant and researcher. I mainly focus on malware analysis, web and mobile based applications testing and methodologies. I am a member of the Africahackon team which is East Africa’s premier technical computer security collective that brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations.&lt;br /&gt;
&lt;br /&gt;
I am also a project leader for the OWASP Project dubbed &amp;quot;OWASP Mth3l3m3nt Framework&amp;quot; (https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project) which is an exploitation framework that aids in a number of activities and uses minimal resources as all it needs is a webserver which can even be run from an android phone without a problem and optionally a database server. It currently comes with the ability to manage web shells and command remote hosts from a central location over HTTP (HTTP Bot) , create custom LFI exploits in as little as 6 lines of code, do custom requests , Generate Web shells and store information on payloads and notes in different DB types if needed, currently it supports  (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL). The framework is envisioned to cover attacks in the OWASP top 10 framework in full while maintaining its ease of deployment and use.&lt;br /&gt;
&lt;br /&gt;
Owasp Kenya is focusing on Educating the new entrants who are not market ready to create a culture of secure development as this is the biggest problem in the region in which Kenya is a technology hub. Their has been a need for information security training especially with the increase in techpreneurs within the region, this is done in collaboration with the Africahackon team to cover the spectrum of secure development and deployment in both campuses and technology hubs in the region to move people from SDLC to SSDLC. &lt;br /&gt;
&lt;br /&gt;
'''Contact Info:''' munir.njiru@owasp.org&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199046</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=199046"/>
				<updated>2015-08-13T10:34:36Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198314</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198314"/>
				<updated>2015-08-03T12:08:44Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [https://www.youtube.com/watch?v=ZFWOKg9c_vA Mth3l3m3nt Framework in Africahackon 2015 CTF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198126</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198126"/>
				<updated>2015-07-30T12:54:56Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=198096</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=198096"/>
				<updated>2015-07-29T14:18:14Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [mailto:Munir.Njiru@owasp.org Munir Njenga] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
2015 is a busy year in the information security field : &lt;br /&gt;
In addition to the Africahackon Conference, the first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
&lt;br /&gt;
====Security Happenings====&lt;br /&gt;
&lt;br /&gt;
=Africahackon 2015=&lt;br /&gt;
&lt;br /&gt;
This Year the 2nd Africahackon Conference is happening on 31st July 2015 at the Ihub and OWASP Kenyan Chapter will be there, will you? .  &lt;br /&gt;
&lt;br /&gt;
For more information, Visit the [http://www.africahackon.com Africahackon Website]&lt;br /&gt;
&lt;br /&gt;
Tickets can Be purchased [https://www.ticketsasa.com/events/eventdetail/view/1629/africahackon_2015 here]&lt;br /&gt;
&lt;br /&gt;
=About Africahackon=&lt;br /&gt;
&lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
AfricaHackOn houses not just ICT professionals but architects, electrical engineers, designers and business professionals. We have fun at what we do and boast of having a golden opportunity to shape the Information Security space across the continent.&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp=&lt;br /&gt;
Africahackon in collaboration with the OWASP Kenyan Chapter had a free 2 day bootcamp between 3rd and 4th July 2015 at JKUAT (Jommo Kenyatta University of Agriculture and Technology) to sensitize them on security as they join the industry. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=198095</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=198095"/>
				<updated>2015-07-29T14:17:04Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [mailto:Munir.Njiru@owasp.org Munir Njenga] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
The first Kenyan Project currently at OWASP is out titled [https://owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
&lt;br /&gt;
====Security Happenings====&lt;br /&gt;
&lt;br /&gt;
=Africahackon 2015=&lt;br /&gt;
&lt;br /&gt;
This Year the 2nd Africahackon Conference is happening on 31st July 2015 at the Ihub and OWASP Kenyan Chapter will be there, will you? .  &lt;br /&gt;
&lt;br /&gt;
For more information, Visit the [http://www.africahackon.com Africahackon Website]&lt;br /&gt;
&lt;br /&gt;
Tickets can Be purchased [https://www.ticketsasa.com/events/eventdetail/view/1629/africahackon_2015 here]&lt;br /&gt;
&lt;br /&gt;
=About Africahackon=&lt;br /&gt;
&lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
AfricaHackOn houses not just ICT professionals but architects, electrical engineers, designers and business professionals. We have fun at what we do and boast of having a golden opportunity to shape the Information Security space across the continent.&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp=&lt;br /&gt;
Africahackon in collaboration with the OWASP Kenyan Chapter had a free 2 day bootcamp between 3rd and 4th July 2015 at JKUAT (Jommo Kenyatta University of Agriculture and Technology) to sensitize them on security as they join the industry. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Kenya&amp;diff=198094</id>
		<title>Kenya</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Kenya&amp;diff=198094"/>
				<updated>2015-07-29T14:16:48Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Kenya|extra=The chapter leader is [mailto:Munir.Njiru@owasp.org Munir Njenga] aided by [mailto:ruth.macharia@owasp.org Ruth Macharia] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Kenya|emailarchives=http://lists.owasp.org/pipermail/owasp-Kenya}}&lt;br /&gt;
&lt;br /&gt;
===Local News===&lt;br /&gt;
The first Kenyan Project currently at OWASP is out titled [owasp.org/index.php/OWASP_Mth3l3m3nt_Framework_Project OWASP Mth3l3m3nt Framework]. It aims to make web penetration testing easier and use of less resources that are readily available platforms. &lt;br /&gt;
&lt;br /&gt;
====Security Happenings====&lt;br /&gt;
&lt;br /&gt;
=Africahackon 2015=&lt;br /&gt;
&lt;br /&gt;
This Year the 2nd Africahackon Conference is happening on 31st July 2015 at the Ihub and OWASP Kenyan Chapter will be there, will you? .  &lt;br /&gt;
&lt;br /&gt;
For more information, Visit the [http://www.africahackon.com Africahackon Website]&lt;br /&gt;
&lt;br /&gt;
Tickets can Be purchased [https://www.ticketsasa.com/events/eventdetail/view/1629/africahackon_2015 here]&lt;br /&gt;
&lt;br /&gt;
=About Africahackon=&lt;br /&gt;
&lt;br /&gt;
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.&lt;br /&gt;
&lt;br /&gt;
AfricaHackOn houses not just ICT professionals but architects, electrical engineers, designers and business professionals. We have fun at what we do and boast of having a golden opportunity to shape the Information Security space across the continent.&lt;br /&gt;
&lt;br /&gt;
=JKUAT Bootcamp=&lt;br /&gt;
Africahackon in collaboration with the OWASP Kenyan Chapter had a free 2 day bootcamp between 3rd and 4th July 2015 at JKUAT (Jommo Kenyatta University of Agriculture and Technology) to sensitize them on security as they join the industry. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Kenya]]&lt;br /&gt;
[[Category:Africa]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198030</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198030"/>
				<updated>2015-07-28T10:52:28Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are:&lt;br /&gt;
* A web bot commander over HTTP to enable post-exploitation more easily&lt;br /&gt;
* A minimal web shell generator to use in commanding vulnerable hosts especially those with File Upload Vulnerabilities and some input injection ones. &lt;br /&gt;
* A payload store to keep new and old payloads that you frequently use and lose. &lt;br /&gt;
* An LFI/RFI exploiter to perform File inclusion attacks and create new exploits on the same. &lt;br /&gt;
* A web request module similar to hurl.it currently supporting GET/POST requests and data very useful when in need of fingerprinting based on server headers and response codes. &lt;br /&gt;
* A payload encoder and decoder to convert payload strings e.g. Hex with 0x prefix for SQL Injection payloads. &lt;br /&gt;
&lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. This principle of ease is intended to be maintained through the project's lifecycle if not made easier. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198029</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198029"/>
				<updated>2015-07-28T10:37:16Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Mth3l3m3nt Framework Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|800px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are, a web bot commander over http to enable post-exploitation more easily, a shell generator , a payload store and an LFI , RFI exploiter. a web request service similar to hurl.it , and payload encoder and decoder. &lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. &lt;br /&gt;
This is envisioned to be the same principle followed throughout the project.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198028</id>
		<title>OWASP Mth3l3m3nt Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mth3l3m3nt_Framework_Project&amp;diff=198028"/>
				<updated>2015-07-28T10:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Munir Njiru: /* Mth3l3m3nt Framework Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mth3l3m3nt Framework Project==&lt;br /&gt;
[[File:Mth3l3m3nt-dashboard.PNG|center|650px]]&lt;br /&gt;
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. Mth3l3m3nt provides the ability to create or do custom LFI and RFI exploits fast with little or no effort at all. It also enables you to store all your quick wins based on its ability to manage HTTP bots, say no to runaway web shells and yes to centrally managed herds in large penetration testing engagements.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. This will enable free and opensource collaboration, being a web based tool, it is intended to make offensive security on the web easier and more efficient as it leverages on existing technologies with few dependencies. It is built on purely opensource components. It is intended to build up to a fully fledged web penetration testing framework with extensibility for zero day exploits in minutes to users. Currently the features it offers: &lt;br /&gt;
&lt;br /&gt;
* Multi-Database Support (JIG,SQLite,MySQL,MongoDB,PostgreSQL,MSSQL)&lt;br /&gt;
* LFI/RFI exploitation Module&lt;br /&gt;
* Web Shell Generator (ASP,PHP,JSP,JSPX)&lt;br /&gt;
* Payload Encoder and Decoder&lt;br /&gt;
* Custom Web Requester (GET/POST)&lt;br /&gt;
* Web Herd (HTTP Bot tool to manage web shells)&lt;br /&gt;
&lt;br /&gt;
'''[https://github.com/alienwithin/mth3l3m3nt-framework Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Mth3l3m3nt Framework is free to use.&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework is licensed under the [http://www.gnu.org/licenses/agpl-3.0.en.html GNU AGPL v3 License], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Mth3l3m3nt Framework Project ==&lt;br /&gt;
It's a tool to exploit the web using the web when simply put. Imagine testing applications on the go, checking for vulnerabilities and analysing assets with no need for complex environments, just your simple web server and a database server, yes it can run on your tab too. tested with Palapa webserver on android running on Lighttpd and MySQL and it works well there also. This project aims to be that tool on the go and with time it will achieve its full potential.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/ZAP ZAP]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/p/mth3l3m3nt-framework OWASP Mth3l3m3nt Framework]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mth3l3m3nt Framework is on [https://github.com/alienwithin/mth3l3m3nt-framework GitHub.] You are encouraged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/alienwithin/mth3l3m3nt-framework/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.en.html]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader(s) aware of your available time to contribute to the project. It is also important to let the Leader(s) know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently the most important aspects though would be along, graphics and UX design as well as researchers etc. Any Ideas are welcome to participate in the project.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mth3l3m3nt Framework project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/alienwithin/mth3l3m3nt-framework/graphs/contributors contributors is found here].  We can't forget the great support of the [http://www.africahackon.com Africahackon] team as this began to take flight and for testing some of its aspects. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Munir_Njiru Munir Njiru]&lt;br /&gt;
* [https://github.com/ikkez Christian Knuth]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Currently already available is the source code ready for download and use. Working on sample videos for it and a PDF document on usage.&lt;br /&gt;
&lt;br /&gt;
The project is envisioned to become a fully fledged security tool to test the OWASP top 10. Currently milestones achieved are, a web bot commander over http to enable post-exploitation more easily, a shell generator , a payload store and an LFI , RFI exploiter. a web request service similar to hurl.it , and payload encoder and decoder. &lt;br /&gt;
It is envisioned to be enabled to test and exploit all the OWASP top 10 vulnerabilities with ease and scalability. For instance currently developing an LFI exploit takes around 6 lines of code in the framework making it quite efficient even for zero day's along the same lines. &lt;br /&gt;
This is envisioned to be the same principle followed throughout the project.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Mth3l3m3nt Framework Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some new exploits.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing documentation for its use. &lt;br /&gt;
* Bringing in fresh design principles from a UX perspective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Builders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Munir Njiru</name></author>	</entry>

	</feed>