All Projects → JoniRinta-Kahila → WPCracker

JoniRinta-Kahila / WPCracker

Licence: MIT license
WordPress pentest tool

Programming Languages

C#
18002 projects

Projects that are alternatives of or similar to WPCracker

sshame
brute force SSH public-key authentication
Stars: ✭ 43 (+26.47%)
Mutual labels:  penetration-testing, brute-force-attacks, brute-force
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+3994.12%)
Mutual labels:  attack, penetration-testing, hacking-tool
Brutegram
Instagram multi-bruteforce Platfrom
Stars: ✭ 183 (+438.24%)
Mutual labels:  brute-force-attacks, brute-force, hacking-tool
DevBrute-A Password Brute Forcer
DevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+167.65%)
Mutual labels:  penetration-testing, brute-force, hacking-tool
Brute-Force-Login
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (+579.41%)
Mutual labels:  brute-force-attacks, brute-force, hacking-tool
GmailBruterV2
Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
Stars: ✭ 264 (+676.47%)
Mutual labels:  brute-force-attacks, brute-force, hacking-tool
Thc Hydra
hydra
Stars: ✭ 5,645 (+16502.94%)
Mutual labels:  penetration-testing, brute-force-attacks, brute-force
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+120.59%)
Mutual labels:  attack, penetration-testing, hacking-tool
Instahack
Best Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (+308.82%)
Mutual labels:  attack, hacking-tool
Snmpwn
An SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+438.24%)
Mutual labels:  attack, brute-force
SSH-PuTTY-login-bruteforcer
Turn PuTTY into an SSH login bruteforcing tool.
Stars: ✭ 222 (+552.94%)
Mutual labels:  penetration-testing, brute-force
boxer
Boxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-55.88%)
Mutual labels:  penetration-testing, hacking-tool
Ska
Simple Karma Attack
Stars: ✭ 55 (+61.76%)
Mutual labels:  attack, penetration-testing
Armor
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+570.59%)
Mutual labels:  attack, penetration-testing
Mhddos
Best DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (+61.76%)
Mutual labels:  attack, hacking-tool
EMAGNET
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 1,427 (+4097.06%)
Mutual labels:  brute-force-attacks, hacking-tool
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+1482.35%)
Mutual labels:  attack, hacking-tool
phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
Stars: ✭ 58 (+70.59%)
Mutual labels:  brute-force-attacks, brute-force
default-http-login-hunter
Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+738.24%)
Mutual labels:  penetration-testing, hacking-tool
minipwner
A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (+55.88%)
Mutual labels:  penetration-testing, hacking-tool

WPCracker

WordPress user enumeration and login Brute Force tool for Windows and Linux

With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how large password batches each thread is tested at a time. However, too much attack power can cause the victim's server to slow down.

For example, When I attacked to my local server, it takes about two days to go through the rockyou.txt (14,341,564 unique passwords) when I used the program's presets for the number of threads (12) and the size of the batches (1000).

In this article, "victim" refers to the attacked WordPress site in pentest lab. Attacking a WordPress site for which you do not have permission may be illegal.

Using:

User Enumeration

.\WPCracker.exe --enum -u <Url to victims WordPress page> -o <Output file path (OPTIONAL)>

OR JUST

.\WPCracker.exe --enum

In this case, the program only requests the required information

Brute Force

Using program's presets

.\WPCracker.exe --brute -u <Url to victims WordPress page> -p <Path to wordlist> -n <Username> -o <Output file path (OPTIONAL)>

OR JUST

.\WPCracker.exe --brute

In this case, the program only requests the required information

Using with custom settings

.\WPCracker.exe --brute -u <Url to victims WordPress page> -p <Path to wordlist> -n <Username> -t <Max threads> -c <Batch maximum size>

Get help

.\WPCracker.exe --brute -?

This is for ethical use only :)

Thank's for adamabdelhamed's PowerArgs

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].