12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 |
- ============================================
- Introduction:
- ============================================
- Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
- ================================================================
- Current Version:
- ==============================
- XSSer v1.8[2]: "The Hiv3!" (2010/2019) // [https://xsser.03c8.net]
- ================================================================
- + INSTALL: AUTO
- ==================
- sudo python setup.py install
- ================================================================
- + INSTALL: MANUAL
- ===================
- XSSer runs on many platforms. It requires Python (3.x) and the following libraries:
- - python3-pycurl - Python bindings to libcurl (Python 3)
- - python3-bs4 - error-tolerant HTML parser for Python 3
- - python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library
- - python3-geoip2 - Python geoip2 API for web services and databases - Python 3.x
- - python3-gi - Python 3 bindings for gobject-introspection libraries
- - python3-cairocffi - cffi-based cairo bindings for Python (Python3)
- On Debian-based systems (ex: Ubuntu), run:
- sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-geoip2 python3-cairocffi
- On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run:
- sudo pip3 install pycurl bs4 geoip2 gobject cairocffi
- #### Source libs:
- * Python: https://www.python.org/downloads/
- * PyCurl: http://pycurl.sourceforge.net/
- * PyBeautifulSoup4: https://pypi.org/project/beautifulsoup4/
- * PyGeoIP: https://pypi.python.org/pypi/GeoIP
- * PyGeoIP2: https://pypi.org/project/geoip2/
- * PyGObject: https://pypi.org/project/gobject/
- * PyCairocffi: https://pypi.org/project/cairocffi/
- ================================================================
|