WPvSCAN
WordPress version scanner written in Python.
Install / Use
/learn @kulichr/WPvSCANREADME
WPvSCAN
WPvSCAN scans the version of CMS WordPress on the target website and compares it with the most recent version. After that, it also offers the option of listing all know exploits using SearchSploit tool by Offensive Security.

Usage
python3 wpvscan.py -t target.com
Requirements
Pip dependencies
Necessary python dependencies should be installed with following command.
pip install -r requirements.txt
Python 3
Whole script is written in Python 3.7., which is recommended for best functionality. Something might not work well in older versions. Python is free to download from official website for all platforms.
SearchSploit
Script offers exploits for found version of WordPress. SearchSploit could be install from official GitHub repository.
Help & issues
If you have any question, ideas or issues, you can report them through Issues.
Related Skills
node-connect
349.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
claude-opus-4-5-migration
109.4kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
frontend-design
109.4kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
model-usage
349.0kUse CodexBar CLI local cost usage to summarize per-model usage for Codex or Claude, including the current (most recent) model or a full model breakdown. Trigger when asked for model-level usage/cost data from codexbar, or when you need a scriptable per-model summary from codexbar cost JSON.
