This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Xenotix XSS Tester"
Ajin Abraham (talk | contribs) |
Ajin Abraham (talk | contribs) |
||
| Line 1: | Line 1: | ||
| − | Xenotix XSS | + | Xenotix XSS Exploit Framework is a penetration testing tool to detect and exploit XSS vulnerabilities in Web Applications. This tool can inject codes into a webpage which are vulnerable to XSS. It is basically a payload list based XSS Scanner. It provides a penetration tester the ability to test all the possible XSS payloads available in the payload list against a web application with ease. The tool supports both manual mode and automated time sharing based test modes. It includes a XSS encoder, a victim side keystroke logger, and an Executable Drive-by downloader. |
---- | ---- | ||
| − | == Features of Xenotix XSS | + | == Features of Xenotix XSS Exploit Framework == |
| − | The features of Xenotix XSS | + | The features of Xenotix XSS Exploit Framework are |
• Built in XSS Payloads | • Built in XSS Payloads | ||
• XSS Key logger | • XSS Key logger | ||
Latest revision as of 18:11, 1 August 2012
Xenotix XSS Exploit Framework is a penetration testing tool to detect and exploit XSS vulnerabilities in Web Applications. This tool can inject codes into a webpage which are vulnerable to XSS. It is basically a payload list based XSS Scanner. It provides a penetration tester the ability to test all the possible XSS payloads available in the payload list against a web application with ease. The tool supports both manual mode and automated time sharing based test modes. It includes a XSS encoder, a victim side keystroke logger, and an Executable Drive-by downloader.
Features of Xenotix XSS Exploit Framework
The features of Xenotix XSS Exploit Framework are • Built in XSS Payloads • XSS Key logger • XSS Executable Drive-by downloader • Automatic XSS Testing • XSS Encoder