This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Xenotix XSS Exploit Framework"
Ajin Abraham (talk | contribs) |
Ajin Abraham (talk | contribs) |
||
| Line 18: | Line 18: | ||
[http://https://www.facebook.com/xenotix Xenotix on Facebook] | [http://https://www.facebook.com/xenotix Xenotix on Facebook] | ||
| − | Snapshot | + | Snapshot : http://keralacyberforce.in/wp-content/uploads/2012/06/xss.png |
Revision as of 18:24, 1 August 2012
About Xenotix XSS Exploit Framework
Xenotix XSS Exploit Framework is a penetration testing tool to detect and exploit XSS vulnerabilities in Web Applications. This tool can inject codes into a webpage which are vulnerable to XSS. It is basically a payload list based XSS Scanner. It provides a penetration tester the ability to test all the possible XSS payloads available in the payload list against a web application with ease. The tool supports both manual mode and automated time sharing based test modes. It includes a XSS encoder, a victim side keystroke logger, and an Executable Drive-by downloader.
Features of Xenotix XSS Exploit Framework
- Built in XSS Payloads
- XSS Key logger
- XSS Executable Drive-by downloader
- Automatic XSS Testing
- XSS Encoder
Snapshot :