============================================ Introduction: ============================================ Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. ================================================================ Current Version: ============================== XSSer v1.8[2]: "The Hiv3!" (2010/2019) // [https://xsser.03c8.net] ================================================================ + INSTALL: AUTO ================== sudo python setup.py install ================================================================ + INSTALL: MANUAL =================== XSSer runs on many platforms. It requires Python (3.x) and the following libraries: - python3-pycurl - Python bindings to libcurl (Python 3) - python3-bs4 - error-tolerant HTML parser for Python 3 - python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library - python3-geoip2 - Python geoip2 API for web services and databases - Python 3.x - python3-gi - Python 3 bindings for gobject-introspection libraries - python3-cairocffi - cffi-based cairo bindings for Python (Python3) On Debian-based systems (ex: Ubuntu), run: sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-geoip2 python3-cairocffi On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run: sudo pip3 install pycurl bs4 geoip2 gobject cairocffi #### Source libs: * Python: https://www.python.org/downloads/ * PyCurl: http://pycurl.sourceforge.net/ * PyBeautifulSoup4: https://pypi.org/project/beautifulsoup4/ * PyGeoIP: https://pypi.python.org/pypi/GeoIP * PyGeoIP2: https://pypi.org/project/geoip2/ * PyGObject: https://pypi.org/project/gobject/ * PyCairocffi: https://pypi.org/project/cairocffi/ ================================================================