SlideShare a Scribd company logo
Submit Search
Upload
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
Report
Share
Ajin Abraham
Security Engineer | Freelance Security Consultant | Speaker at IMMUNIO
Follow
•
2 likes
•
4,739 views
1
of
29
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
•
2 likes
•
4,739 views
Report
Share
Download Now
Download to read offline
Technology
Education
Ajin Abraham
Security Engineer | Freelance Security Consultant | Speaker at IMMUNIO
Follow
Recommended
Xenotix XSS Exploit Framework: Clubhack 2012 by
Xenotix XSS Exploit Framework: Clubhack 2012
Ajin Abraham
3.9K views
•
26 slides
Abusing Google Apps and Data API: Google is My Command and Control Center by
Abusing Google Apps and Data API: Google is My Command and Control Center
Ajin Abraham
8.7K views
•
24 slides
Abusing Exploiting and Pwning with Firefox Addons by
Abusing Exploiting and Pwning with Firefox Addons
Ajin Abraham
5.7K views
•
20 slides
Injecting Security into vulnerable web apps at Runtime by
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
3K views
•
56 slides
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013 by
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Ajin Abraham
10.3K views
•
6 slides
Exploit Research and Development Megaprimer: Win32 Egghunter by
Exploit Research and Development Megaprimer: Win32 Egghunter
Ajin Abraham
3.1K views
•
21 slides
More Related Content
More from Ajin Abraham
Injecting Security into Web apps at Runtime Whitepaper by
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham
3.1K views
•
9 slides
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ... by
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
67K views
•
38 slides
Automated Security Analysis of Android & iOS Applications with Mobile Securit... by
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
26.1K views
•
24 slides
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S... by
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
10K views
•
18 slides
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
8K views
•
53 slides
Hacking Tizen: The OS of everything - Whitepaper by
Hacking Tizen: The OS of everything - Whitepaper
Ajin Abraham
3.8K views
•
11 slides
More from Ajin Abraham
(16)
Injecting Security into Web apps at Runtime Whitepaper by Ajin Abraham
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham
•
3.1K views
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ... by Ajin Abraham
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
•
67K views
Automated Security Analysis of Android & iOS Applications with Mobile Securit... by Ajin Abraham
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
•
26.1K views
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S... by Ajin Abraham
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
•
10K views
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by Ajin Abraham
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
•
8K views
Hacking Tizen: The OS of everything - Whitepaper by Ajin Abraham
Hacking Tizen: The OS of everything - Whitepaper
Ajin Abraham
•
3.8K views
Hacking Tizen : The OS of Everything - Nullcon Goa 2015 by Ajin Abraham
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham
•
7K views
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains by Ajin Abraham
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Ajin Abraham
•
4.6K views
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ... by Ajin Abraham
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Ajin Abraham
•
5K views
Exploit Research and Development Megaprimer: Unicode Based Exploit Development by Ajin Abraham
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Ajin Abraham
•
1.9K views
Exploit Research and Development Megaprimer: Buffer overflow for beginners by Ajin Abraham
Exploit Research and Development Megaprimer: Buffer overflow for beginners
Ajin Abraham
•
1.4K views
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen... by Ajin Abraham
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
Ajin Abraham
•
3.6K views
Wi-Fi Security with Wi-Fi P+ by Ajin Abraham
Wi-Fi Security with Wi-Fi P+
Ajin Abraham
•
2.4K views
Shellcoding in linux by Ajin Abraham
Shellcoding in linux
Ajin Abraham
•
3.4K views
Phishing With Data URI by Ajin Abraham
Phishing With Data URI
Ajin Abraham
•
2.3K views
Buffer overflow for Beginners by Ajin Abraham
Buffer overflow for Beginners
Ajin Abraham
•
948 views
Recently uploaded
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum... by
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS
34 views
•
35 slides
The details of description: Techniques, tips, and tangents on alternative tex... by
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada
121 views
•
24 slides
Future of Learning - Khoong Chan Meng by
Future of Learning - Khoong Chan Meng
NUS-ISS
33 views
•
7 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf
Phactum Softwareentwicklung GmbH
28 views
•
73 slides
Uni Systems for Power Platform.pptx by
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.
50 views
•
21 slides
Business Analyst Series 2023 - Week 3 Session 5 by
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10
209 views
•
20 slides
Recently uploaded
(20)
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum... by NUS-ISS
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS
•
34 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada
•
121 views
Future of Learning - Khoong Chan Meng by NUS-ISS
Future of Learning - Khoong Chan Meng
NUS-ISS
•
33 views
20231123_Camunda Meetup Vienna.pdf by Phactum Softwareentwicklung GmbH
20231123_Camunda Meetup Vienna.pdf
Phactum Softwareentwicklung GmbH
•
28 views
Uni Systems for Power Platform.pptx by Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.
•
50 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10
•
209 views
Throughput by Moisés Armani Ramírez
Throughput
Moisés Armani Ramírez
•
36 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About Postman
Postman
•
27 views
The Research Portal of Catalonia: Growing more (information) & more (services) by CSUC - Consorci de Serveis Universitaris de Catalunya
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya
•
73 views
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ... by Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
•
25 views
Top 10 Strategic Technologies in 2024: AI and Automation by AutomationEdge Technologies
Top 10 Strategic Technologies in 2024: AI and Automation
AutomationEdge Technologies
•
14 views
Combining Orchestration and Choreography for a Clean Architecture by ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs1
•
69 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst
•
470 views
RADIUS-Omnichannel Interaction System by RADIUS
RADIUS-Omnichannel Interaction System
RADIUS
•
15 views
.conf Go 2023 - Data analysis as a routine by Splunk
.conf Go 2023 - Data analysis as a routine
Splunk
•
93 views
Understanding GenAI/LLM and What is Google Offering - Felix Goh by NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS
•
41 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi
•
120 views
Report 2030 Digital Decade by Massimo Talia
Report 2030 Digital Decade
Massimo Talia
•
14 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab
•
15 views
AI: mind, matter, meaning, metaphors, being, becoming, life values by Twain Liu 刘秋艳
AI: mind, matter, meaning, metaphors, being, becoming, life values
Twain Liu 刘秋艳
•
35 views