WORD-PRESS
==============Wpscan :
>>> wpscan --url https://url.com
>>> wpscan --url http://IP_ADDR --enumerate u,p,t
==============Bruteforce login page
>>> wpscan --url $URL --username <name> --wordlist <path to list>
==============Random agent :
>>> wpscan --url $URL --random-agent
==============Zoom.py - enumerate wordpress users
>>> python zoom.py -u $URL
==============vulnx :
>>> vulnx -u https://example.com/ --cms --dns -d -w -e
==============cmsmap :
>>> python3 cmsmap.py https://www.example.com -F
==============wpseku.py :
>>> python3 wpseku.py --url https://www.target.com --verbose
=============Quick wordpress bruteforce:
python patator.py http_fuzz url=http://$ip/wp-login.php raw_request=rawlogin 0=/usr/share/rockyou.txt -l /tmp/login &; tail -f /tmp/login | grep 302
Last updated