1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

28009 killed #22

Closed julesmoretti closed 2 years ago

julesmoretti commented 6 years ago

[2] 28009 killed ./wordpress-xmlrpc-brute-v2.py

Few questions:

What does 28009 mean? and is there a way to have an status of attempts success and failures. Plus ideally the ability to resume wherever one gets kicked off?