xmlrpc-bruteforcer icon indicating copy to clipboard operation
xmlrpc-bruteforcer copied to clipboard

Multi-threaded XMLRPC brute forcer using amplification attacks targeting WordPress installations prior to version 4.4.

Results 9 xmlrpc-bruteforcer issues
Sort by recently updated
recently updated
newest added

Hey aress31, could you provide me with the resource you used to determine that the maximum # of calls per `system.multicall()` is 1999? I'm curious to see if there is...

wonder if you can added more target website (on list) on 1 attack, not only 1 target at a time.

Hello bro. Found strange bug. Installed Wordpress 5.2 for testing. Create user admin 12345 - scrypt works fine Create user sergo 123456 - scrypt doesn't work Make direct POST from...

not work on centos 7. Which Os do you work on?

I get this error , any ideas? Traceback (most recent call last): File "xmlrpc-bruteforcer.py", line 227, in main() File "xmlrpc-bruteforcer.py", line 204, in main queue = reader(wordlist, chunks_size, verbose) File...

Hi - Not a python Guru. If the password is the first in list - works OK Otherwise fails If using the -c 1 option finds the correct password anywhere...

Fixed typo. File is called xmlrpc-bruteforcer.py from pull.

Bumps [tqdm](https://github.com/tqdm/tqdm) from 4.41.1 to 4.66.3. Release notes Sourced from tqdm's releases. tqdm v4.66.3 stable cli: eval safety (fixes CVE-2024-34062, GHSA-g7vv-2v7x-gj9p) tqdm v4.66.2 stable pandas: add DataFrame.progress_map (#1549) notebook: fix...

dependencies