NOTE: PROJECT DEVELOPMENT AND SUPPORT IS DISCONTINUED
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
Official OWASP Project Page: https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework
Contact: ajin.abraham AT owasp DOT org
Antivirus Solutions may detect it as a threat. However it is due to the features in the exploitation framework.
SHA256: 68096d574aacf51cea46708d473d5c6b13d3b5039c8f3587d2325c9bdefdcbc1
- Microsoft .NET Framework 4.5 http://www.microsoft.com/en-in/download/details.aspx?id=30653
- IronPython 2.7.3 http://ironpython.codeplex.com/downloads/get/423690 [If you are using Scripting Engine]
MD5: 17c703f90dbb4f09b112284232bbb69f
MD5: 17c703f90dbb4f09b112284232bbb69f
MD5: 54a2335e35c47b1e5a87b163088c63ff
MD5: bdfce2d4af4012ecc20b86bed876a54a
tags: xss, xss scanner, xss exploit, xenotix, dom xss scanner, xss attacks