WordPressMassExploiter
[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS
Install / Use
/learn @paralelo14/WordPressMassExploiterREADME
WordPressMassExploiter
Mass exploiter of CVE-2015-1579 for WordPress CMS
This mass exploiter is based on CVE-2015-1579, discovered by CLAUDIO VIVIANI (https://www.exploit-db.com/exploits/36554/)
How it works:
1 - I use Selenium Framework to make the search on google.
2 - The results of search, are parsed and links are stored into wordpressAFD_results.txt file.
3 - The fuzzer() & download_wp_config() try download wp-config from all targets.
Exemple of using the tool:
$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"'
$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"' --period=lastYear (See options for this parameter on --help)
*OBS[1]: You can change the country of google search, the default is .com.br. BUT you won't be able to use --period parameter
*OBS[2]: INSTALL ALL DEPENDENCYS... (selenium beautifulsoup4 requests docopt tqdm python-nmap .... I don't remember all :D)
Related Skills
node-connect
353.3kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
111.7kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
353.3kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
353.3kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
