| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 | ============================================Introduction:============================================Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.================================================================Current Version:==============================XSSer v1.8[2]: "The Hiv3!" (2010/2019) // [https://xsser.03c8.net]================================================================+ INSTALL: AUTO==================  sudo python setup.py install================================================================+ INSTALL: MANUAL===================XSSer runs on many platforms. It requires Python (3.x) and the following libraries:    - python3-pycurl - Python bindings to libcurl (Python 3)    - python3-bs4 - error-tolerant HTML parser for Python 3    - python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library    - python3-geoip2 - Python geoip2 API for web services and databases - Python 3.x    - python3-gi - Python 3 bindings for gobject-introspection libraries    - python3-cairocffi - cffi-based cairo bindings for Python (Python3)On Debian-based systems (ex: Ubuntu), run:     sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-geoip2 python3-cairocffiOn other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run:    sudo pip3 install pycurl bs4 geoip2 gobject cairocffi####  Source libs:       * Python: https://www.python.org/downloads/       * PyCurl: http://pycurl.sourceforge.net/       * PyBeautifulSoup4: https://pypi.org/project/beautifulsoup4/       * PyGeoIP: https://pypi.python.org/pypi/GeoIP       * PyGeoIP2: https://pypi.org/project/geoip2/       * PyGObject: https://pypi.org/project/gobject/       * PyCairocffi: https://pypi.org/project/cairocffi/================================================================
 |