1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

project still alive ? there are a few improvements #32

Closed ruz0ne closed 2 years ago

ruz0ne commented 4 years ago

hey,

are you still working on this project? i really like it i also have a few improvements which we can add..

let me know

thanks

1N3 commented 4 years ago

hey, I'm no longer updating this as the old 0day has long been fixed and I don't have time to maintain updates to all projects. However, if you have any PR's you want to submit, I will likely approve them.

sam0jones0 commented 2 years ago

hey,

are you still working on this project? i really like it i also have a few improvements which we can add..

let me know

thanks

What improvements did you have in mind? I could take a look at implementing some if they're not too extreme.

Might look into pause/resume to handle server ip bans..