SkillAgentSearch skills...

WordPressMassExploiter

[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS

Install / Use

/learn @paralelo14/WordPressMassExploiter
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

WordPressMassExploiter

Mass exploiter of CVE-2015-1579 for WordPress CMS

This mass exploiter is based on CVE-2015-1579, discovered by CLAUDIO VIVIANI (https://www.exploit-db.com/exploits/36554/)

How it works:

1 - I use Selenium Framework to make the search on google.

2 - The results of search, are parsed and links are stored into wordpressAFD_results.txt file.

3 - The fuzzer() & download_wp_config() try download wp-config from all targets.

Exemple of using the tool:

$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"'

$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"' --period=lastYear (See options for this parameter on --help)

*OBS[1]: You can change the country of google search, the default is .com.br. BUT you won't be able to use --period parameter

*OBS[2]: INSTALL ALL DEPENDENCYS... (selenium beautifulsoup4 requests docopt tqdm python-nmap .... I don't remember all :D)

Related Skills

View on GitHub
GitHub Stars29
CategoryDevelopment
Updated9d ago
Forks19

Languages

Python

Security Score

75/100

Audited on Mar 31, 2026

No findings