============================================
Introduction:
============================================

Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.

================================================================
Current Version:
==============================

XSSer v1.8[4]: "The Hiv€!" (2010/2021) // [https://xsser.03c8.net]

================================================================
+ INSTALL: AUTO
==================

  sudo python setup.py install (or sudo python3 setup.py install)

================================================================
+ INSTALL: MANUAL
===================

XSSer runs on many platforms. It requires Python (3.x) and the following libraries:

    - python3-pycurl - Python bindings to libcurl (Python 3)
    - python3-bs4 - error-tolerant HTML parser for Python 3
    - python3-geoip - Python3 bindings for the GeoIP IP-to-country resolver library
    - python3-gi - Python 3 bindings for gobject-introspection libraries
    - python3-cairocffi - cffi-based cairo bindings for Python (Python3)
    - python3-selenium - Python3 bindings for Selenium
    - firefoxdriver - Firefox WebDriver support

On Debian-based systems (ex: Ubuntu), run: 

    sudo apt-get install python3-pycurl python3-bs4 python3-geoip python3-cairocffi python3-selenium firefoxdriver

On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run:

    sudo pip3 install pycurl bs4 pygeoip gobject cairocffi selenium 

####  Source libs:

       * Python: https://www.python.org/downloads/
       * PyCurl: http://pycurl.sourceforge.net/
       * PyBeautifulSoup4: https://pypi.org/project/beautifulsoup4/
       * PyGeoIP: https://pypi.org/project/pygeoip/
       * PyGObject: https://pypi.org/project/gobject/
       * PyCairocffi: https://pypi.org/project/cairocffi/
       * PySelenium: https://pypi.org/project/selenium/

================================================================

