Wordpress Brute Force Multithreading with standard and xml-rpc login method written in python.
Coded By : WordpressBRUTE v3.0 Written by: H4CKG3H2Y1_lvwuwei https://www.byy3.com [email protected] [email protected] https://hysy.ga USAG:python3 wordpressbrute.py Standard login request: python3 wordpressbrute.py -S -t https://target.com -u admin -w /usr/share/wordlists/rockyou.txt --timeout 30 Xml-rpc login request: python wordpressbrute.py -X -t http[s]://target.com[:port] -u username -w wordlist [--timeout in sec]
1) Multithreading 2) xml-rpc brute force mode 3) http and https protocols support 4) Random User Agent 5) Big wordlist support
Standard login request: python wordbrutepress.py -S -t http[s]://target.com[:port] -u username -w wordlist [--timeout in sec] Xml-rpc login request: python wordbrutepress.py -X -t http[s]://target.com[:port] -u username -w wordlist [--timeout in sec]
# 2021-2-21 v3.0 for python3 # 2015-11-20 v2.1 # 1) Add new feature: Big wordlist support (thanks to guly @theguly) # 2) Fix faultcode check instead of "403" code for XML-RPC (thanks to guly @theguly) # # 2015-04-12 v2.0 # 1) Add new feature xml-rpc brute force mode # 2) Fix minor bugs # # 2015-04-11 v1.1 # 1) optparse (Deprecated since version 2.7) replaced by argparse # 2) Fix connection bugs