1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

SyntaxError: Missing parentheses in call to 'print' #24

Closed DenisMalofeyev closed 2 years ago

DenisMalofeyev commented 6 years ago

File "./wordpress-xmlrpc-brute-v2.py", line 31 print bcolors.OKBLUE + " .___ " + bcolors.ENDC SyntaxError: Missing parentheses in call to 'print'

xguya commented 6 years ago

Working with python, but doesn't works with python3.x

abhayp-cedcoss commented 4 years ago

Yes getting the same issue could anyone please help us on this

lillois59 commented 4 years ago

Hello World !

Try this cmd below and let me know its working for me in Py2 env using MBP El Cptn :

git clone https://github.com/1N3/Wordpress-XMLRPC-Brute-Force-Exploit.git cd Wordpress-XMLRPC-Brute-Force-Exploit chmod +x wordpress-xmlrpc-brute-v1.py ./wordpress-xmlrpc-brute-v1.py

lillois59 commented 4 years ago

File "./wordpress-xmlrpc-brute-v2.py", line 31 print bcolors.OKBLUE + " .___ " + bcolors.ENDC SyntaxError: Missing parentheses in call to 'print'

Yes getting the same issue could anyone please help us on this

Hello World !

Try this cmd below and let me know its working for me in Py2 env using MBP El Cptn :

git clone https://github.com/1N3/Wordpress-XMLRPC-Brute-Force-Exploit.git cd Wordpress-XMLRPC-Brute-Force-Exploit chmod +x wordpress-xmlrpc-brute-v1.py ./wordpress-xmlrpc-brute-v1.py