Yesterday, 05:27 PM
[center]
[/center]
[center]=7Admin Panel Cracker With { Python }[/center]
[center]
Admin Panel Cracker With { Python }
Features
Comprehensive WordPress fingerprinting (version, themes, plugins, users)
Vulnerability scanning for WordPress core, themes, and plugins
Active exploitation of detected vulnerabilities
Detailed reporting of vulnerabilities and exploitation results
Mass scanning capability for multiple targets
Automatic updates for both tool and vulnerability databases
Installation
Prerequisites
Python 3.7+
Git (for easy updates)
Setup
Clone the repository:
git clone https://github.com/Triotion/wp-scanner.git
cd wp-scanner
Install dependencies:
pip install -r requirements.txt
Run the tool:
python wp_scanner.py -h
Usage
Basic Scan
python wp_scanner.py -t example.com
Scan with Exploitation
python wp_scanner.py -t example.com --exploit
Mass Scan from File
python wp_scanner.py -l targets.txt --mass-output-dir mass_results
Update Tool and Vulnerability Databases
python wp_scanner.py --update
Scan with Auto-Update
python wp_scanner.py -t example.com --auto-update
Target List Generation
You can generate a list of targets using the helper script:
python create_targets_list.py -i raw_urls.txt -o targets.txt --check-wordpress
Usage:
usage: create_targets_list.py [-h] [-o OUTPUT] [-i INPUT] [-u URLS [URLS ...]]
[--subdomains SUBDOMAINS] [--append] [--check-wordpress]
Generate target list for WP-Scanner mass scans
options:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
Output file for the target list
-i INPUT, --input INPUT
Input file with targets (one per line)
-u URLS [URLS ...], --urls URLS [URLS ...]
URLs to add to the target list
--subdomains SUBDOMAINS
File with subdomains enumeration results
--append Append to output file instead of overwriting
--check-wordpress Basic check if targets are WordPress (slower)
Additional Options
usage: wp_scanner.py [-h] [-t TARGET] [-l TARGETS_FILE] [-o OUTPUT] [--threads THREADS]
[--timeout TIMEOUT] [--user-agent USER_AGENT] [--proxy PROXY] [--exploit] [-v]
[--mass-output-dir MASS_OUTPUT_DIR] [--update] [--auto-update]
[--report-format {console,html,md}]
WordPress Vulnerability Scanner and Exploitation Tool
options:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Target WordPress site URL
-l TARGETS_FILE, --targets-file TARGETS_FILE
File containing list of target URLs (one per line)
-o OUTPUT, --output OUTPUT
Output directory for scan results
--threads THREADS Number of threads (default: 5)
--timeout TIMEOUT Request timeout in seconds (default: 30)
--user-agent USER_AGENT
Custom User-Agent string
--proxy PROXY Proxy URL (e.g., http://127.0.0.1:8080)
--exploit Attempt to exploit found vulnerabilities
-v, --verbose Enable verbose output
--mass-output-dir MASS_OUTPUT_DIR
Base directory for mass scan results (default: mass_scan_results)
--update Update the tool and vulnerability databases
--auto-update Automatically update the tool before scanning
--report-format {console,html,md}
Output report format (default: console)
=7Download Link
[/center]
=7Download Link
[/center]
[/center][center]=7Admin Panel Cracker With { Python }[/center]
[center]
Admin Panel Cracker With { Python }
Features
Comprehensive WordPress fingerprinting (version, themes, plugins, users)
Vulnerability scanning for WordPress core, themes, and plugins
Active exploitation of detected vulnerabilities
Detailed reporting of vulnerabilities and exploitation results
Mass scanning capability for multiple targets
Automatic updates for both tool and vulnerability databases
Installation
Prerequisites
Python 3.7+
Git (for easy updates)
Setup
Clone the repository:
git clone https://github.com/Triotion/wp-scanner.git
cd wp-scanner
Install dependencies:
pip install -r requirements.txt
Run the tool:
python wp_scanner.py -h
Usage
Basic Scan
python wp_scanner.py -t example.com
Scan with Exploitation
python wp_scanner.py -t example.com --exploit
Mass Scan from File
python wp_scanner.py -l targets.txt --mass-output-dir mass_results
Update Tool and Vulnerability Databases
python wp_scanner.py --update
Scan with Auto-Update
python wp_scanner.py -t example.com --auto-update
Target List Generation
You can generate a list of targets using the helper script:
python create_targets_list.py -i raw_urls.txt -o targets.txt --check-wordpress
Usage:
usage: create_targets_list.py [-h] [-o OUTPUT] [-i INPUT] [-u URLS [URLS ...]]
[--subdomains SUBDOMAINS] [--append] [--check-wordpress]
Generate target list for WP-Scanner mass scans
options:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
Output file for the target list
-i INPUT, --input INPUT
Input file with targets (one per line)
-u URLS [URLS ...], --urls URLS [URLS ...]
URLs to add to the target list
--subdomains SUBDOMAINS
File with subdomains enumeration results
--append Append to output file instead of overwriting
--check-wordpress Basic check if targets are WordPress (slower)
Additional Options
usage: wp_scanner.py [-h] [-t TARGET] [-l TARGETS_FILE] [-o OUTPUT] [--threads THREADS]
[--timeout TIMEOUT] [--user-agent USER_AGENT] [--proxy PROXY] [--exploit] [-v]
[--mass-output-dir MASS_OUTPUT_DIR] [--update] [--auto-update]
[--report-format {console,html,md}]
WordPress Vulnerability Scanner and Exploitation Tool
options:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Target WordPress site URL
-l TARGETS_FILE, --targets-file TARGETS_FILE
File containing list of target URLs (one per line)
-o OUTPUT, --output OUTPUT
Output directory for scan results
--threads THREADS Number of threads (default: 5)
--timeout TIMEOUT Request timeout in seconds (default: 30)
--user-agent USER_AGENT
Custom User-Agent string
--proxy PROXY Proxy URL (e.g., http://127.0.0.1:8080)
--exploit Attempt to exploit found vulnerabilities
-v, --verbose Enable verbose output
--mass-output-dir MASS_OUTPUT_DIR
Base directory for mass scan results (default: mass_scan_results)
--update Update the tool and vulnerability databases
--auto-update Automatically update the tool before scanning
--report-format {console,html,md}
Output report format (default: console)
=7Download Link
[/center]
=7Download Link
[/center]

