1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
449 stars 198 forks source link

Can't Handle Large PW Lists? #25

Closed peterstavrou closed 2 years ago

peterstavrou commented 6 years ago

Traceback (most recent call last): File "/root/Wordpress-XMLRPC-Brute-Force-Exploit-master/wordpress-xmlrpc-brute-v2.py", line 97, in passwds = f.read().splitlines() MemoryError

1N3 commented 2 years ago

This should be fixed now in the latest public repo.