1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

Improvements #14

Closed keymandll closed 7 years ago

keymandll commented 7 years ago

Updated the code to accept a list of usernames via the command line so each of these users can be brute-forced. Also, I have optimised the code so now it is shorter and much more easier to follow/review. Hopefully I understood the logic of the original code correctly so this still works fine.

1N3 commented 7 years ago

Was getting some errors trying to run the updated script so going to revert the main branch back to normal for now until I figure out what the issue is.

keymandll commented 7 years ago

It was working fine for me. Could you please provide more details about the errors? Maybe I can have a look at it too.

1N3 commented 7 years ago

Hey, appreciate the improvements here. I was able to get it working after I understood the username parsing in your code, so I pushed this to the main branch for release. I also tested everything and it seems to be working well.

keymandll commented 7 years ago

Awesome. I'm happy that it worked out.