Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Scopex is a lightweight, passive-first reconnaissance tool designed to identify WordPress attack surfaces safely and efficiently, while strictly respecting scope boundaries.

License

Notifications You must be signed in to change notification settings

URDev4ever/ScopeX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

14 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Scopex

πŸ‡ΊπŸ‡Έ English | πŸ‡ͺπŸ‡Έ EspaΓ±ol

image

Scopex is a fast, terminal-based reconnaissance tool designed to analyze WordPress targets while strictly respecting scope boundaries. It focuses on visibility, clarity, and safety, helping bug bounty hunters and ethical hackers understand the WordPress attack surface before doing any exploitation.


Lightweight Scope-Aware WordPress Reconnaissance Tool

Version 2.2

This tool is WordPress-only by design. (Intended to change in the future)


✨ Features

🧭 Scope-Aware Scanning

  • Enforces scope rules from a dedicated scopes/ directory

  • Supports:

    • Root domains (example.com)
    • Subdomains (admin.example.com)
    • Wildcards (*.example.com)
  • Automatically skips out-of-scope targets

  • Prevents accidental scanning of unauthorized assets


🧠 WordPress Detection

Detects WordPress using multiple indicators:

  • Common WordPress paths
  • REST API presence
  • HTML content analysis

If WordPress is not detected, the scan stops early.


πŸ”Ž WordPress Reconnaissance

Once WordPress is detected, ScopeX performs:

  • WordPress version detection

  • Passive plugin discovery:

    • Direct plugin paths
    • REST API references
  • Detection of exposed sensitive files:

    • wp-config.php
    • .env
    • .git/config
    • Debug logs
  • REST API route analysis

  • User enumeration via REST API (non-intrusive)

  • Brute force protection detection

  • CVE lookup for detected WordPress version

  • Automatic risk scoring and classification


πŸ“Š Risk Assessment Engine

Each target receives a risk score (0–100) based on findings such as:

  • Confirmed critical file exposure
  • User enumeration
  • Missing brute force protection
  • Development / unstable WordPress versions

Risk levels:

  • INFO
  • LOW
  • MEDIUM
  • HIGH
  • CRITICAL

πŸ“„ Output & Reporting

Scopex generates:

  • Detailed per-target reports (.txt)
  • Optional JSON output (--json)
  • A global summary report for all scanned targets

All results are saved inside the output/ directory.


πŸ“ Project Structure

ScopeX/
β”‚
β”œβ”€β”€ scopex.py
β”œβ”€β”€ requirements.txt
β”œβ”€β”€ README.md
β”œβ”€β”€ README_ES.md
β”‚
β”œβ”€β”€ scopes/
β”‚   └── scope.txt        # example scope file
β”‚
└── output/
    └── .gitkeep         # output files are generated at runtime

πŸš€ Installation

Clone the repository:

git clone https://github.com/urdev4ever/ScopeX.git
cd ScopeX

Install dependencies:

pip install -r requirements.txt

πŸ› οΈ Usage

python scopex.py [-h] [--url URL] [--list LIST] [--scope SCOPE] [--json] [--verbose] [--silent]

Scan a single target

python scopex.py --url example.com

Scan with scope enforcement

python scopex.py --url example.com --scope scope.txt

The scope file must be located inside the scopes/ directory. (Important!)


Scan multiple targets from a file

python scopex.py --list targets.txt

This will NOT filter out-of-scope elements.


JSON output

python scopex.py --url example.com --json

Verbose mode (show REST API routes)

python scopex.py --url example.com --verbose

Silent mode (no console output)

python scopex.py --url example.com --silent

πŸ“Œ Scope File Format (scopes/scope.txt)

# Scopex scope file
# One entry per line
# Lines starting with # are comments

example.com
*.example.com
api.example.com
admin.example.com

Rules

  • ❌ Do NOT include http:// or https://
  • ❌ Do NOT include paths or ports
  • βœ… Wildcards must start with *.

πŸ“‚ Output Files

Generated automatically inside output/:

  • {target}_{timestamp}.txt
  • {target}_{timestamp}.json (if --json is enabled)
  • summary_{timestamp}.txt

🎯 Example Output

In this example the command used was:

python scopex.py --url wordpress.org

Output:

. image

. image

. image

. image


🚫 What Scopex Does NOT Do

Scopex intentionally avoids:

  • Exploitation
  • Brute-force attacks
  • Password guessing
  • Payload injection
  • Active fuzzing
  • Aggressive crawling

It is a reconnaissance and assessment tool, not an exploitation framework.


🎯 Intended Audience

  • Bug bounty hunters (early recon phase)
  • Ethical hackers
  • Pentesters needing WordPress visibility
  • Anyone who wants clean recon without tool bloat

⚠️ Disclaimer

This tool is intended for authorized security testing only. The author is not responsible for misuse.


🧠 Philosophy

β€œRecon is about understanding the surface β€” not attacking it.”

Scopex helps you:

  • Stay in scope
  • Reduce noise
  • Identify real priorities
  • Decide what to test manually

Made with <3 by URDev.

About

Scopex is a lightweight, passive-first reconnaissance tool designed to identify WordPress attack surfaces safely and efficiently, while strictly respecting scope boundaries.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages