WordPress Exploit Framework Logo

WordPress Exploit Framework

0
Free
Visit Website

A Ruby framework designed to aid in the penetration testing of WordPress systems. Installation: To install the latest stable build, run 'gem install wpxf'. After installation, you can launch the WordPress Exploit Framework console by running 'wpxf'. Requirements: Ruby >= 2.4.4 is required to run WordPress Exploit Framework. Troubleshooting Installation: Debian Systems: If you have issues installing WPXF's dependencies (in particular, Nokogiri), first make sure you have all the tooling necessary to compile C extensions: 'sudo apt-get install build-essential patch'. It’s possible that you don’t have important development header files installed on your system. Here’s what you should do if you should find yourself in this situation: 'sudo apt-get install ruby-dev zlib1g-dev liblzma-dev libsqlite3-dev'. Windows Systems: If you are experiencing errors that indicate that 'libcurl.dll' could not be loaded, you will need to ensure the latest libcurl binary is included in your Ruby bin folder, or any other folder that is in your environment's PATH variable. The latest version can be downloaded from http://curl.haxx.se/download.html. As of 16/05/2016, the latest release.

FEATURES

ALTERNATIVES

FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.

A penetration testing tool for intercepting SSH connections and logging plaintext passwords.

Modular framework for pentesting Modbus protocol with diagnostic and offensive features.

A Python script for creating a cohesive and up-to-date penetration testing framework.

A cross-platform web fuzzer written in Nim

Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.

A blog post discussing the often overlooked dangers of CSV injection in applications.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security