Tools and Utilities
Maintain your Android Tablet with major file editing tools like Astro, ES File Explorer and much more! Download Astro File Manager and ES File Explorer.
Click on the title of this section to expand the list and show you every app in our system!
Xenotix Mobile« Personalization & Tools « Downloads
|Updated||December 23, 2014|
|Category||Personalization & Tools|
Xenotix Mobile, the world’s first Mobile Web App Scanner capable of detecting Cross Site Scripting (XSS) Vulnerability. Now you can scan an detect XSS from your android mobile and create scan reports.
Zero False Positives
Believe us, Xenotix Mobile give zero False Positive results. We make our scans within the browser engine and make sure we had identified a valid XSS.
Xenotix Mobile Proxy
All the scans are passed through our cloud based proxy to mitigate browser security features that will prevent XSS from executing.
Generate Scan Reports from your android device. Xenotix Mobile allows you to generate reports after a scan.
Encode your payloads and bypass WAFs. Xenotix Mobile provides a payload encoder that allows you to encode XSS payloads into a variety of formats.
Make GET and POST Request with Xenotix Mobile and view the results in a WebView.
Strong Payload Database
Xenotix Mobile’s payload database consist of context suitable and WAF bypassing payloads.
OpenSecurity |Xenotix .All Rights Reserved
What personal information do we collect from the people that visit our blog, website or app?
When using our scanner, as appropriate,we may collect your IP Address for analytics.
When do we collect information?
We collect information from you when you During Scan or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
• To improve our website in order to better serve you.
How do we protect visitor information?
We do not use vulnerability scanning and/or scanning to PCI standards.
We use regular Malware Scanning.
We do not use an SSL certificate
• We only provide articles and information, we never ask for personal or private information like email addresses, or credit card numbers.
Do we use ‘cookies’?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser’s Help menu to learn the correct way to modify your cookies.
If you disable cookies off, some features will be disabled that make your site experience more efficient and some of our services will not function properly.
However, you can still place orders .
Third Party Disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide you with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others’ rights, property, or safety.
However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
Third party links
We do not include or offer third party products or services on our website.
We don’t track anything
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under 13, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We market to
We do not collect information from children under 13
children under 13.
In order to remove your child’s information please contact the following personnel:
We adhere to the following COPPA tenants:
• Parents can review, delete, manage or refuse with whom their child’s information is shared through contacting us directly.
or contacting us directly.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via in site notification
• Within 7 business days
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
To be accordance with CANSPAM we agree to the following:
If at any time you would like to unsubscribe from receiving future emails, you can
and we will promptly remove you from ALL correspondence.
Last Edited on 2014-12-20