WPSploit Logo

WPSploit

0
Free
Visit Website

WPSploit is a repository designed for creating and/or porting specific exploits for WordPress using Metasploit as an exploitation tool. It currently contains 45 modules (15 exploits and 30 auxiliaries). For usage, download the modules to a directory, and refer to the official documentation of Metasploit for loading external modules. All modules are based on the WPScan Vulnerability Database (WPVDB). For contributions, fork the repository, create a new feature branch, commit changes, and create a new pull request. Questions and suggestions can be sent to robertoespreto[at]gmail.com.

FEATURES

ALTERNATIVES

A distributed systems and infrastructure simulator for attacking and debugging Kubernetes.

A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.

A tool for performing hash length extension attacks against multiple hashing algorithms.

Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.

Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

A suite of tools for Wi-Fi network security assessment and penetration testing.

A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved