Thanks to visit codestin.com
Credit goes to github.com

Skip to content

girorme/wp-xmlrpcry

Repository files navigation

WordPress Logo

WP-XMLRPCry

WP-XMLRPCry is a powerful WordPress XML-RPC brute-force tool. It's designed to test the security of WordPress websites by attempting to log in with a list of usernames and passwords.

Requirements:

  • Docker

or elixir 1.14 locally to run in your host machine instead of docker

How to Use

You can use WP-XMLRPCry with various options to perform a WordPress XML-RPC brute-force attack. Here are the available options:

Usage:
  wp_xmlrpcry [options]

Example:
  wp_xmlrpcry -u url_list.txt --users users.txt -w wordlist.txt -c workers_qty -o output

Options:
  -h  --help           Print help message
  -u  --url-list       File containing a list of URLs
  --users              File containing a list of usernames
  -w  --wordlist       File containing one password per line
  -c  --concurrency    Number of workers to spawn (default: 1)
  -o  --output         File to write the results

Run via docker

Build the image

$ docker build -t wpxmlrpcry .

Run it via the wpxmlrpcry script:

./wpxmlrpcry -u urls.txt -o output.txt

The files must be in the input directory

Here you can use the parameters than you need

Run locally using elixir

To compile the tool, run the following command:

$ mix escript.build

This command generates a binary executable inside the bin/ folder, so after the build you can run the tool:

$ ./bin/wpxmlrpcry args...

Disclaimer

Please use this tool responsibly and ethically to test the security of your WordPress websites or for any other legitimate purposes. Unauthorized brute-force attacks may be illegal and violate the terms of service of many websites.

About

WIP: xmlrpc brute force

Resources

Stars

Watchers

Forks

Packages

No packages published