This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Xenotix XSS Exploit Framework"
Ajin Abraham (talk | contribs) |
Ajin Abraham (talk | contribs) |
||
| Line 1: | Line 1: | ||
| − | ='''Xenotix XSS Exploit Framework | + | {{Social Media Links}} |
| − | + | = Main = | |
| − | + | [[Image:Xenotix.png|right]] | |
| + | <div style="font-size:120%;border:none;margin: 0;color:#000"> | ||
| + | '''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. | ||
| − | [[ | + | [[Image:Button.png | link=http://packetstorm.wowhacker.com/web/Xenotix_XSS_Exploit_Framework_V4.rar]] |
| + | *'''Mirror 1:[http://keralacyberforce.in/downloads/Xenotix%20XSS%20Exploit%20Framework%20V4.rar Kerala Cyber Force]''' | ||
| + | *'''Mirror 2: [https://www.dropbox.com/s/ookdse6pyszh736/Xenotix%20XSS%20Exploit%20Framework%20V4.rar DropBox] | ||
| − | * | + | </div> |
| + | |||
| + | = Screenshots = | ||
| + | |||
| + | {| | ||
| + | |- | ||
| + | | | ||
| + | [[Image:POST_SCANNER.png||530px|thumb|Xenotix POST Request Scanner ]] | ||
| + | | | ||
| + | [[Image:XENOTIX INFO.png||530px|thumb|left|Xenotix Information Gathering Modules]] | ||
| + | |- | ||
| + | | | ||
| + | [[Image:XENOTIX EXPLOITATION.png|thumb|530px|Xenotix Exploitation Modules]] | ||
| + | | | ||
| + | [[Image:WEBKIT DEVELOPER.png|thumb|530px|left|WebKit Developer Tools]] | ||
| + | |} | ||
| + | |||
| + | = Conference Talks = | ||
| + | |||
| + | <div style="font-size:120%;border:none;margin: 0;color:#000"> | ||
| + | '''DEFCON DCG Banglore 2013''' | ||
| + | *Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ] | ||
| + | |||
| + | '''BlackHat Europe Arsenal 2013''' | ||
| + | *Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ] | ||
| + | |||
| + | '''Nulcon Goa 2013''' | ||
| + | *Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ] | ||
| + | |||
| + | '''ClubHack 2012''' | ||
| + | *Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2] | ||
| + | Video | ||
| + | {{#ev:youtube|NYZLP0q7-y4}} | ||
| + | |||
| + | </div> | ||
| + | |||
| + | = Features = | ||
| − | + | <div style="font-size:120%;border:none;margin: 0;color:#000"> | |
| − | + | '''SCANNER MODULES''' | |
*Manual Mode Scanner | *Manual Mode Scanner | ||
| Line 20: | Line 60: | ||
*Hidden Parameter Detector | *Hidden Parameter Detector | ||
| − | + | '''INFORMATION GATHERING MODULES''' | |
*Victim Fingerprinting | *Victim Fingerprinting | ||
| Line 29: | Line 69: | ||
*Internal Network Scan | *Internal Network Scan | ||
| − | + | '''EXPLOITATION MODULES''' | |
*Send Message | *Send Message | ||
| Line 49: | Line 89: | ||
*Firefox Download and Execute Addon (Persistent) | *Firefox Download and Execute Addon (Persistent) | ||
| − | + | '''UTILITY MODULES''' | |
*WebKit Developer Tools | *WebKit Developer Tools | ||
*Payload Encoder | *Payload Encoder | ||
| + | </div> | ||
| + | |||
| + | = Tutorials = | ||
| + | |||
| + | <div style="font-size:120%;border:none;margin: 0;color:#000"> | ||
| + | '''Version 3 Videos''' | ||
| + | OWASP Xenotix XSS Exploit Framework v3: XSS Scanner Module{{#ev:youtube|CJEgO4_kd-8}} | ||
| + | OWASP Xenotix XSS Exploit Framework v3: XSS Keylogger{{#ev:youtube|owfF9C_Xerw}} | ||
| + | OWASP Xenotix XSS Exploit Framework v3: XSS Executable Drive-By{{#ev:youtube|i8c3kf4t6A8}} | ||
| + | OWASP Xenotix XSS Exploit Framework v3: XSS Reverse Shell{{#ev:youtube|IT-8IH3yRrA}} | ||
| + | OWASP Xenotix XSS Exploit Framework v3: XSS DDoSer{{#ev:youtube|cgLGgVWvi9Y}} | ||
| + | |||
| + | |||
| + | '''Version 2 Videos''' | ||
| + | OWASP Xenotix XSS Exploit Framework Version 2 {{#ev:youtube|ei1ny7L8-8k}} | ||
| + | |||
| + | </div> | ||
| − | = | + | = Get Involved = |
| − | + | <div style="font-size:120%;border:none;margin: 0;color:#000"> | |
| − | + | Involvement in the development of Xenotix is highly encouraged! | |
| − | |||
| − | |||
| − | |||
| − | + | Here are some of the ways you can help: | |
| − | + | ==Support Us== | |
| − | *[ | + | *Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook] |
| − | *[ | + | *Official Page: [[http://www.keralacyberforce.in/owasp-xenotix-xss-exploit-framework-v4-2013 Xenotix @ Kerala Cyber Force]] |
| − | |||
| − | |||
| − | |||
| − | + | ==Feedback & Queries== | |
| − | * | + | * Do you have any issues with it? |
| + | * Do you find any design flows or errors? | ||
| + | * Do you need help in using it? | ||
| + | * Do you have something to tell about it? | ||
| − | + | Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform | |
| − | + | ==Development== | |
| − | + | Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' | |
| + | If you actively contribute to Xenotix then you will be invited to join the project. | ||
| − | + | </div> | |
| − | |||
| − | + | = Project About = | |
| + | <div style="font-size:120%;border:none;margin: 0;color:#000"> | ||
| − | + | {{:Projects/OWASP Xenotix XSS Exploit Framework | Project About}} | |
| − | + | __NOTOC__ <headertabs /> | |
| − | + | [[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]] | |
| − | |||
| − | |||
| − | |||
Revision as of 14:36, 22 August 2013
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
- Mirror 1:Kerala Cyber Force
- Mirror 2: DropBox
DEFCON DCG Banglore 2013
- Presentation: OWASP Xenotix XSS Exploit Framework v4
BlackHat Europe Arsenal 2013
- Presentation: OWASP Xenotix XSS Exploit Framework v3
Nulcon Goa 2013
- Presentation: OWASP Xenotix XSS Exploit Framework v3
ClubHack 2012
- Presentation: OWASP Xenotix XSS Exploit Framework v2
Video
SCANNER MODULES
- Manual Mode Scanner
- Auto Mode Scanner
- DOM Scanner
- Multiple Parameter Scanner
- POST Request Scanner
- Header Scanner
- Fuzzer
- Hidden Parameter Detector
INFORMATION GATHERING MODULES
- Victim Fingerprinting
- Browser Fingerprinting
- Browser Features Detector
- Ping Scan
- Port Scan
- Internal Network Scan
EXPLOITATION MODULES
- Send Message
- Cookie Thief
- Phisher
- Tabnabbing
- Keylogger
- HTML5 DDoSer
- Executable Drive By
- JavaScript Shell
- Reverse HTTP WebShell
- Drive-By Reverse Shell
- Metasploit Browser Exploit
- Firefox Reverse Shell Addon (Persistent)
- Firefox Session Stealer Addon (Persistent)
- Firefox Keylogger Addon (Persistent)
- Firefox DDoSer Addon (Persistent)
- Firefox Linux Credential File Stealer Addon (Persistent)
- Firefox Download and Execute Addon (Persistent)
UTILITY MODULES
- WebKit Developer Tools
- Payload Encoder
Version 3 Videos
OWASP Xenotix XSS Exploit Framework v3: XSS Scanner Module OWASP Xenotix XSS Exploit Framework v3: XSS Keylogger OWASP Xenotix XSS Exploit Framework v3: XSS Executable Drive-By OWASP Xenotix XSS Exploit Framework v3: XSS Reverse Shell OWASP Xenotix XSS Exploit Framework v3: XSS DDoSer
Version 2 Videos
Involvement in the development of Xenotix is highly encouraged!
Here are some of the ways you can help:
Support Us
- Facebook Page: Xenotix on Facebook
- Official Page: [Xenotix @ Kerala Cyber Force]
Feedback & Queries
- Do you have any issues with it?
- Do you find any design flows or errors?
- Do you need help in using it?
- Do you have something to tell about it?
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform
Development
Are you a developer? Do you have some cool ideas to contribute? Get in touch via ajin [DOT] abraham [AT] owasp.org If you actively contribute to Xenotix then you will be invited to join the project.
| PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| |||||||||||||||||||||||||||||||||||
