OWASP Xenotix XSS Exploit Framework is an innovative Cross-Site Scripting (XSS) weakness detection and exploitation framework. It gives Zero False Positive scan results along with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ particular XSS Payloads for effective XSS vulnerability diagnosis and WAF Bypass. It is incorporated with a feature-rich Information Gathering module for target Reconnaissance.
The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
Current Features:
SCANNER MODULES
- Manual Mode Scanner
- Auto Mode Scanner
- DOM Scanner
- Multiple Parameter Scanner
- POST Request Scanner
- Header Scanner
- Fuzzer
- Hidden Parameter Detector
INFORMATION GATHERING MODULES
- WAF Fingerprinting
- Victim Fingerprinting
- Browser Fingerprinting
- Browser Features Detector
- Ping Scan
- Port Scan
- Internal Network Scan
EXPLOITATION MODULES
- Send Message
- Cookie Thief
- Phisher
- Tabnabbing
- Keylogger
- HTML5 DDoSer
- Load File
- Executable Drive-By
- JavaScript Shell
- Reverse HTTP WebShell
- Drive-By Reverse Shell
- Metasploit Browser Exploit
- Firefox Reverse Shell Addon (Persistent)
- Firefox Session Stealer Addon (Persistent)
- Firefox Keylogger Addon (Persistent)
- Firefox DDoSer Addon (Persistent)
- Firefox Linux Credential File Stealer Addon (Persistent)
- Firefox Download and Execute Addon (Persistent)
UTILITY MODULES
- WebKit Developer Tools
- Payload Encoder
- JavaScript Beautify
- Hash Calculator
- Hash Detector