Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. https://xsser.03c8.net/

psy e68241314b minor fix %!s(int64=2) %!d(string=hai) anos
.github 28334db377 XSSer v1.8.2 - 'The Hiv3' release %!s(int64=5) %!d(string=hai) anos
core e68241314b minor fix %!s(int64=2) %!d(string=hai) anos
doc d11bb3f65c XSSer v1.8.4 - 'The Hiv3' release %!s(int64=3) %!d(string=hai) anos
gtk d11bb3f65c XSSer v1.8.4 - 'The Hiv3' release %!s(int64=3) %!d(string=hai) anos
.gitattributes 28334db377 XSSer v1.8.2 - 'The Hiv3' release %!s(int64=5) %!d(string=hai) anos
.gitignore 28334db377 XSSer v1.8.2 - 'The Hiv3' release %!s(int64=5) %!d(string=hai) anos
.pylintrc 28334db377 XSSer v1.8.2 - 'The Hiv3' release %!s(int64=5) %!d(string=hai) anos
Makefile d11bb3f65c XSSer v1.8.4 - 'The Hiv3' release %!s(int64=3) %!d(string=hai) anos
README.md b4e24fbc99 Updated README.md %!s(int64=4) %!d(string=hai) anos
setup.py d11bb3f65c XSSer v1.8.4 - 'The Hiv3' release %!s(int64=3) %!d(string=hai) anos
xsser 30fc0c8d50 XSSer v1.8[3] - 'The HiV€!' release %!s(int64=4) %!d(string=hai) anos

README.md

XSSer



Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.

It provides several options to try to bypass certain filters and various special techniques for code injection.

XSSer has pre-installed [ > 1300 XSS ] attacking vectors and can bypass-exploit code on several browsers/WAFs:

 [PHPIDS]: PHP-IDS
 [Imperva]: Imperva Incapsula WAF
 [WebKnight]: WebKnight WAF
 [F5]: F5 Big IP WAF
 [Barracuda]: Barracuda WAF
 [ModSec]: Mod-Security
 [QuickDF]: QuickDefense
 [Sucuri]: SucuriWAF 
 [Chrome]: Google Chrome
 [IE]: Internet Explorer
 [FF]: Mozilla's Gecko rendering engine, used by Firefox/Iceweasel
 [NS-IE]: Netscape in IE rendering engine mode
 [NS-G]: Netscape in the Gecko rendering engine mode
 [Opera]: Opera Browser

XSSer


Installing:

XSSer runs on many platforms. It requires Python (3.x) and the following libraries:

- python3-pycurl - Python bindings to libcurl (Python 3)
- python3-bs4 - error-tolerant HTML parser for Python 3
- python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library
- python3-gi - Python 3 bindings for gobject-introspection libraries
- python3-cairocffi - cffi-based cairo bindings for Python (Python3)
- python3-selenium - Python3 bindings for Selenium
- firefoxdriver - Firefox WebDriver support

On Debian-based systems (ex: Ubuntu), run:

sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-gi python3-cairocffi python3-selenium firefoxdriver

On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run:

sudo pip3 install pycurl bs4 pygeoip gobject cairocffi selenium

Source libs:


License:

XSSer is released under the GPLv3. You can find the full license text in the LICENSE file.


Screenshots:

XSSer

XSSer

XSSer

XSSer

XSSer

XSSer

XSSer

XSSer