This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Xenotix XSS Exploit Framework

From OWASP
Revision as of 18:29, 1 August 2012 by Ajin Abraham (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

About Xenotix XSS Exploit Framework


384573_483442131684026_981096434_n.jpg


Xenotix XSS Exploit Framework is a penetration testing tool to detect and exploit XSS vulnerabilities in Web Applications. This tool can inject codes into a webpage which are vulnerable to XSS. It is basically a payload list based XSS Scanner. It provides a penetration tester the ability to test all the possible XSS payloads available in the payload list against a web application with ease. The tool supports both manual mode and automated time sharing based test modes. It includes a XSS encoder, a victim side keystroke logger, and an Executable Drive-by downloader.

Features of Xenotix XSS Exploit Framework


    1. Built in XSS Payloads
    2. XSS Key logger
    3. XSS Executable Drive-by downloader
    4. Automatic XSS Testing
    5. XSS Encoder

Xenotix on Facebook