WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and xmlrpc.php, featuring smart password placeholders, username enumeration, and auto-plugin/theme uploader with shell verification. Built for speed, efficiency, and full automation.
☆20Apr 22, 2025Updated 10 months ago
Alternatives and similar repositories for WP-Brute
Users that are interested in WP-Brute are comparing it to the libraries listed below
Sorting:
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆36Oct 7, 2025Updated 4 months ago
- Beelzebub all in one Hacking Tools, Shell finder, Zone-H Grabber, ReverseIP, SMTP Finder, XMLRPC BF and more☆38May 27, 2025Updated 9 months ago
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated 11 months ago
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- ☆13May 24, 2023Updated 2 years ago
- AutoExploiter Wordpress , Joomla , Drupal☆18Mar 27, 2018Updated 7 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- Series hướng dẫn tạo một Plugin Minecraft của riêng bạn☆10Sep 23, 2023Updated 2 years ago
- The new generation of famous WSO web shell. With perks included☆43Feb 12, 2026Updated 3 weeks ago
- Domain Grabber Made With Love :3☆13May 3, 2025Updated 10 months ago
- ☆11Apr 18, 2022Updated 3 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Personal Security Blog☆13Nov 4, 2024Updated last year
- Parser library for 8SVX: digitally sampled audio voices consisting of 8-bit samples☆12Mar 2, 2024Updated 2 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- A google dork parser that bypasses captcha's automatically.☆17Jul 15, 2025Updated 7 months ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆11Jan 27, 2019Updated 7 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- 基于机器学习的Webshell检测工具☆12May 15, 2023Updated 2 years ago
- Goby-Poc-Collection for Goby scanner https://github.com/gobysec/Goby - forked from many github accounts Thanks the authors☆12Dec 10, 2023Updated 2 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- An patch porting qwingraph (wingraph written in qt4) to qt5.☆10Aug 21, 2019Updated 6 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 5 months ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- SPAM filter rules for Stalwart Mail Server☆14Dec 16, 2025Updated 2 months ago
- Webapp builder: The easy (and fast) way to create a web project☆13Jul 3, 2017Updated 8 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- ☆18Aug 15, 2025Updated 6 months ago