WordPress Exploit Framework Logo

WordPress Exploit Framework

0
Free
Visit Website

A Ruby framework designed to aid in the penetration testing of WordPress systems. Installation: To install the latest stable build, run 'gem install wpxf'. After installation, you can launch the WordPress Exploit Framework console by running 'wpxf'. Requirements: Ruby >= 2.4.4 is required to run WordPress Exploit Framework. Troubleshooting Installation: Debian Systems: If you have issues installing WPXF's dependencies (in particular, Nokogiri), first make sure you have all the tooling necessary to compile C extensions: 'sudo apt-get install build-essential patch'. It’s possible that you don’t have important development header files installed on your system. Here’s what you should do if you should find yourself in this situation: 'sudo apt-get install ruby-dev zlib1g-dev liblzma-dev libsqlite3-dev'. Windows Systems: If you are experiencing errors that indicate that 'libcurl.dll' could not be loaded, you will need to ensure the latest libcurl binary is included in your Ruby bin folder, or any other folder that is in your environment's PATH variable. The latest version can be downloaded from http://curl.haxx.se/download.html. As of 16/05/2016, the latest release.

FEATURES

ALTERNATIVES

A cheat sheet providing examples of creating reverse shells for penetration testing.

A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

Generate a variety of suspect actions detected by Falco rulesets.

Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.

Collection of penetration testing scripts for AWS with a focus on reconnaissance.

A framework for exploiting Android-based devices and applications

Interactive online malware sandbox for real-time analysis and threat intelligence