1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

Fixed HTTP request header bug. Replaced use of urllib with requests. … #16

Closed keymandll closed 7 years ago

keymandll commented 7 years ago

…Throws exception if xmlrpc request gets redirected.

Please test on a vulnerable WP instance to make sure everything works as expected.