============================================ Introduction: ============================================ Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. ================================================================ Current Version: ============================== XSSer v1.8[3]: "The Hiv€!" (2010/2030) // [https://xsser.03c8.net] ================================================================ + INSTALL: AUTO ================== sudo python setup.py install (or sudo python3 setup.py install) ================================================================ + INSTALL: MANUAL =================== XSSer runs on many platforms. It requires Python (3.x) and the following libraries: - python3-pycurl - Python bindings to libcurl (Python 3) - python3-bs4 - error-tolerant HTML parser for Python 3 - python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library - python3-gi - Python 3 bindings for gobject-introspection libraries - python3-cairocffi - cffi-based cairo bindings for Python (Python3) - python3-selenium - Python3 bindings for Selenium - firefoxdriver - Firefox WebDriver support On Debian-based systems (ex: Ubuntu), run: sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-cairocffi python3-selenium firefoxdriver On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run: sudo pip3 install pycurl bs4 pygeoip gobject cairocffi selenium #### Source libs: * Python: https://www.python.org/downloads/ * PyCurl: http://pycurl.sourceforge.net/ * PyBeautifulSoup4: https://pypi.org/project/beautifulsoup4/ * PyGeoIP: https://pypi.org/project/pygeoip/ * PyGObject: https://pypi.org/project/gobject/ * PyCairocffi: https://pypi.org/project/cairocffi/ * PySelenium: https://pypi.org/project/selenium/ ================================================================