Skip to content

[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS

Notifications You must be signed in to change notification settings

paralelo14/WordPressMassExploiter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 

Repository files navigation

WordPressMassExploiter

Mass exploiter of CVE-2015-1579 for WordPress CMS

This mass exploiter is based on CVE-2015-1579, discovered by CLAUDIO VIVIANI (https://www.exploit-db.com/exploits/36554/)

How it works:

1 - I use Selenium Framework to make the search on google.

2 - The results of search, are parsed and links are stored into wordpressAFD_results.txt file.

3 - The fuzzer() & download_wp_config() try download wp-config from all targets.

Exemple of using the tool:

$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"'

$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"' --period=lastYear (See options for this parameter on --help)

*OBS[1]: You can change the country of google search, the default is .com.br. BUT you won't be able to use --period parameter

*OBS[2]: INSTALL ALL DEPENDENCYS... (selenium beautifulsoup4 requests docopt tqdm python-nmap .... I don't remember all :D)

About

[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages