This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Projects/OWASP Xenotix XSS Exploit Framework"
From OWASP
Ajin Abraham (talk | contribs) |
Ajin Abraham (talk | contribs) |
||
| Line 2: | Line 2: | ||
| project_name =OWASP Xenotix XSS Exploit Framework v3 2013 | | project_name =OWASP Xenotix XSS Exploit Framework v3 2013 | ||
| project_home_page =OWASP Xenotix_XSS_Exploit_Framework | | project_home_page =OWASP Xenotix_XSS_Exploit_Framework | ||
| − | | project_description = | + | | project_description =Xenotix XSS Exploit Framework is a penetration testing tool to detect and exploit XSS vulnerabilities in Web Applications. It is basically a payload list based XSS Scanner and XSS Exploitation kit and has has the world's second largest XSS Payload list. It provides a penetration tester the ability to test all the XSS payloads available in the payload list against a web application to test for XSS vulnerabilities. The tool supports both manual mode and automated time sharing based test modes. The exploitation framework in the tool includes a XSS encoder, a victim side XSS keystroke logger, an Executable Drive-by downloader and a XSS Reverse Shell. These exploitation tools will help the penetration tester to create proof of concept attacks on vulnerable web applications during the creation of a penetration test report. |
| project_license =Creative Commons Attribution ShareAlike 3.0 License (best for documentation projects) | | project_license =Creative Commons Attribution ShareAlike 3.0 License (best for documentation projects) | ||
Revision as of 12:56, 8 June 2013
| PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| |||||||||||||||||||||||||||||||||||