Welcome![Sign In][Sign Up]
Location:
Downloads SourceCode OS program Exploit
Title: XSSF-3.0 Download
 Description: Cross-Site Scripting Framework (XSSF) is a security tool, it can be very easy to use cross-site scripting (XSS) vulnerability. The main objective of XSSF XSS show actual harm.
 Downloaders recently: [More information of uploader redzl]
 To Search:
File list (Check if you may need any files):
 

XSSF\modules\auxiliary\xssf\public\network\ms_windows_html5\scan_network.rb
....\.......\.........\....\......\.......\................\scan_ports.rb
....\.......\.........\....\......\.......\ie\ipconfig.rb
....\.......\.........\....\......\android\steal_sdcard_file.rb
....\.......\.........\....\......\iphone\skype_call.rb
....\.......\.........\....\......\persistence\iframize.rb
....\.......\.........\....\......\...........\ghostify.rb
....\.......\.........\....\......\old_browsers\trace_method_results.rb
....\.......\.........\....\......\............\bypass_sop_ie6.rb
....\.......\.........\....\......\network\ping.rb
....\.......\.........\....\......\.......\connection_speed.rb
....\.......\.........\....\......\.......\web_services.rb
....\.......\.........\....\......\.......\distributed_dos.rb
....\.......\.........\....\......\elastix\Elastix_PBX_voip_call.rb
....\.......\.........\....\......\misc\logkeys.rb
....\.......\.........\....\......\....\prompt.rb
....\.......\.........\....\......\....\webcam_capture.rb
....\.......\.........\....\......\....\tabnapping.rb
....\.......\.........\....\......\....\detect_properties.rb
....\.......\.........\....\......\....\load_applet.rb
....\.......\.........\....\......\....\visited_pages.rb
....\.......\.........\....\......\....\change_interval.rb
....\.......\.........\....\......\....\save_page.rb
....\.......\.........\....\......\....\csrf.rb
....\.......\.........\....\......\....\check_connected.rb
....\.......\.........\....\......\....\redirect.rb
....\.......\.........\....\......\....\alert.rb
....\.......\.........\....\......\....\xss_get_bounce.rb
....\.......\.........\....\......\....\load_pdf.rb
....\.......\.........\....\......\....\cookie.rb
....\.......\.........\....\......\....\get_page.rb
....\.......\.........\....\......\ie\command.rb
....\.......\.........\....\......\chrome\filejacking.rb
....\data\xssf\gui\logs.png
....\....\....\...\xmlrpc.png
....\....\....\...\safari.png
....\....\....\...\opera.png
....\....\....\...\fr.png
....\....\....\...\help.html
....\....\....\...\loop.png
....\....\....\...\armitage1.png
....\....\....\...\armitage2.png
....\....\....\...\swfobject.js
....\....\....\...\test.png
....\....\....\...\lin.png
....\....\....\...\ofc.swf
....\....\....\...\xssf.png
....\....\....\...\module.png
....\....\....\...\post.png
....\....\....\...\tunnel1.png
....\....\....\...\tunnel2.png
....\....\....\...\help.png
....\....\....\...\attack1.png
....\....\....\...\attack2.png
....\....\....\...\auto1.png
....\....\....\...\auto2.png
....\....\....\...\ie.png
....\....\....\...\win.png
....\....\....\...\start.png
....\....\....\...\stats.png
....\....\....\...\unknown.png
....\....\....\...\run.png
....\....\....\...\exploit1.png
....\....\....\...\exploit2.png
....\....\....\...\es.png
....\....\....\...\osx.png
....\....\....\...\chrome.png
....\....\....\...\infos.png
....\....\....\...\victims.png
....\....\....\...\uk.png
....\....\....\...\proxy.png
....\....\....\...\de.png
....\....\....\...\ff.png
....\....\....\resources\jquery.simplemodal.js
....\....\....\.........\Point3D.class
....\....\....\.........\jquery.webcam.js
....\....\....\.........\WireframeViewer.class
....\....\....\.........\Edge.class
....\....\....\.........\draw.jar
....\....\....\.........\jquery.js
....\....\....\.........\cmd.pdf
....\....\....\.........\jscam.swf
....\lib\xssf\webrickpatches.rb
....\...\....\xssfmaster.rb
....\...\....\xssfdatabase.rb
....\...\....\xssfgui.rb
....\...\....\xssfbanner.rb
....\...\....\xssftunnel.rb
....\...\....\xssfserver.rb
....\plugins\xssf.rb
....\README_XSSF
....\modules\auxiliary\xssf\public\network\ms_windows_html5
....\.......\.........\....\......\.......\ie
....\.......\.........\....\......\android
....\.......\.........\....\......\iphone
....\.......\.........\....\......\persistence
....\.......\.........\....\......\old_browsers
....\.......\.........\....\......\network
....\.......\.........\....\......\elastix
....\.......\.........\....\......\misc
    

CodeBus www.codebus.net