Multi-threaded XMLRPC brute forcer using amplification attacks targeting WordPress installations prior to version 4.4.
112
stars
41
forks
source link
Traceback (most recent call last): File "xmlrpc-bruteforcer.py", line 227, in <module> main() File "xmlrpc-bruteforcer.py", line 204, in main queue = reader(wordlist, chunks_size, verbose) File "xmlrpc-bruteforcer.py", line 162, in reader chunk = list(islice(wordlist, chunks_size)) File "/usr/lib/python3.8/codecs.py", line 322, in decode (result, consumed) = self._buffer_decode(data, self.errors, final) UnicodeDecodeError: 'utf-8' codec can't decode byte 0xf1 in position 923: invalid continuation byte #7
Closed
subhash0x closed 3 years ago
Traceback (most recent call last): File "xmlrpc-bruteforcer.py", line 227, in
main()
File "xmlrpc-bruteforcer.py", line 204, in main
queue = reader(wordlist, chunks_size, verbose)
File "xmlrpc-bruteforcer.py", line 162, in reader
chunk = list(islice(wordlist, chunks_size))
File "/usr/lib/python3.8/codecs.py", line 322, in decode
(result, consumed) = self._buffer_decode(data, self.errors, final)
UnicodeDecodeError: 'utf-8' codec can't decode byte 0xf1 in position 923: invalid continuation byte