Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!

cracked.io | Best Forum Around | Free Premium Accounts




 34006

[OPEN-SOURCE] Wordpress Bruter. [PYTHON]

by Kushd - 14 November, 2019 - 01:31 AM
This post is by a banned member (Kushd) - Unhide
Kushd  
Infinity
167
Posts
47
Threads
4 Years of service
#1
(This post was last modified: 17 December, 2019 - 11:10 PM by Kushd.)
Firstly not my code.

Hidden Content
You must register or login to view this content.



" This is an exploit for Wordpress xmlrpc.php System Multicall function affecting the most current version of Wordpress (3.5.1). The exploit works by sending 1,000+ auth attempts per request to xmlrpc.php in order to "brute force" valid Wordpress users and will iterate through whole wordlists until a valid user response is acquired. It will then selectively acquire and display the valid username and password to login. "

If for whatever reason you can't get the script to work
Read this tutorial and do it manually


Hidden Content
You must register or login to view this content.

 
This post is by a banned member (kandex2172) - Unhide
This post is by a banned member (k4lel) - Unhide
This post is by a banned member (Alpha520) - Unhide
This post is by a banned member (SynnX) - Unhide
SynnX  
Registered
32
Posts
0
Threads
4 Years of service
#5
/565555555555555555555555555555555
This post is by a banned member (Tundx0) - Unhide
Tundx0  
Registered
41
Posts
0
Threads
4 Years of service
#6
I've been looking for this for a while now
This post is by a banned member (efebag) - Unhide
efebag  
Registered
111
Posts
3
Threads
4 Years of service
#7
I will try it
This post is by a banned member (b2000b) - Unhide
b2000b  
Registered
23
Posts
0
Threads
4 Years of service
#8
i will try if working bro

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)