Skip to content
This repository has been archived by the owner on May 28, 2021. It is now read-only.

ali-alharthi/WP-Attacker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WP-Attacker V4

Coder : Ali (@r00t3rz)
Home  : r00t3rz.com

What's WP Attacker:
- Scan the server's websites, and filter the ones that are using WorePress (Using Bing search engin [API]).
- Get All the possible plugins and themese, which are vulnerable (Using a list). *UPDATED*
- BruteForce each website that uses Wordpress (Using a correct username and a passwords list).
- BruteForce each website that uses Wordpress (via XMLRPC's file using a correct username). *NEW*
- Get All the possible plugins and themes, which are vulnerable (Using security dbs). *UPDATED*
- Exploit 'em (Using more than 20 new/0day exploits). *UNDERGROUND*

Why WP Attacker?
- Using Bing API, Which leads to faster & guaranteed responde.
- User can use his own 0day exploits.
- BruteForce with two methods/ways.
- List can be updated by the user.
- Fast, simple and easy.

# In a simple word, it is an "Automatic WP Exploiter".

Disclaimer:
- THIS TOOL WAS WRITTEN FOR EDUCATIONAL PURPOSES. ONLY USE THIS TOOL ON WEBSITES YOU ARE ALLOWED TO TEST
- THE AUTHOR CANNOT AND WILL NOT IN ANY WAY LIABLE FOR ANY LOSS OR DAMAGE ARISING WITH THE USE OF THIS TOOL.
- USE IT UNDER YOUR OWN RISK!
- IF YOU DON'T AGREE WITH WHAT I SAID, PLEASE DON'T USE THIS TOOL.

Thanks and enjoy.

Best regards, Ali.

About

In a simple word, it is an "Automatic WP Exploiter".

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages