XSSer - Exploiting and Detecting XSS vulnerabilities in Web-based apps

Introduction
  Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
   * Web: http://xsser.03c8.net


Installing
   git clone https://github.com/epsylon/xsser
   cd xsser
   cd xsser
   python setup.py install
   ./xsser -h
   ./xsser --gtk

   XSSer runs on many platforms. It requires Python and the following libraries:
    - python-pycurl - Python bindings to libcurl
    - python-xmlbuilder - create xml/(x)html files - Python 2.x
    - python-beautifulsoup - error-tolerant HTML parser for Python
    - python-geoip - Python bindings for the GeoIP IP-to-country resolver library
  
   On Debian-based systems (ex: Ubuntu), run:
      sudo apt-get install python-pycurl python-xmlbuilder python-beautifulsoup python-geoip

   On other systems such as: Kali, Ubuntu, ArchLinux, ParrotSec, Fedora, etc... also run: pip install geoip

Source libs:
 * Python
 * PyCurl
 * PyBeautifulSoup
 * PyGeoIP

Screenshots



Examples
   View HELP: xsser -h or xsser --help
   Check for update: xsser --update
   Launch GTK interface (GUI): xsser --gtk
   Simple injection from URL: xsser -u "http://example.com"

License:

   XSSer is released under the terms of the GPL v3 and is copyrighted by psy.