OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
SCANNER MODULES
- Manual Mode Scanner
- Auto Mode Scanner
- DOM Scanner
- Multiple Parameter Scanner
- POST Request Scanner
- Header Scanner
- Fuzzer
- Hidden Parameter Detector
INFORMATION GATHERING MODULES
- Victim Fingerprinting
- Browser Fingerprinting
- Browser Features Detector
- Ping Scan
- Port Scan
- Internal Network Scan
EXPLOITATION MODULES
- Send Message
- Cookie Thief
- Phisher
- Tabnabbing
- Keylogger
- HTML5 DDoSer
- Executable Drive By
- JavaScript Shell
- Reverse HTTP WebShell
- Drive-By Reverse Shell
- Metasploit Browser Exploit
- Firefox Reverse Shell Addon (Persistent)
- Firefox Session Stealer Addon (Persistent)
- Firefox Keylogger Addon (Persistent)
- Firefox DDoSer Addon (Persistent)
- Firefox Linux Credential File Stealer Addon (Persistent)
- Firefox Download and Execute Addon (Persistent)
UTILITY MODULES
- WebKit Developer Tools
- Payload Encoder