_ _______ _____ _
| | | | ___ \/ ___| | |
| | | | |_/ /\ `--. ___| | ___ _
| |/\| | __/ `--. \/ _ \ |/ / | | |
\ /\ / | /\__/ / __/ <| |_| |
\/ \/\_| \____/ \___|_|\_\\__,_|
|| WPSeku - WordPress Security Scanner
|| Version 0.2.0
|| Momo Outaadi (M4ll0k)
||
https://github.com/m4ll0k/WPSeku
Usage: wpseku.py [-t/--target]
http://target.com
-t --target Target url (eg:
http://target.com)
-x --xss Testing Cross Site Scripting (xss) vulns
-s --sql Testing SQL Injection (sql) vulns
-l --lfi Testing Local File Inclusion (lfi) vulns
-b --brute Bruteforcing login, wp-login [l] or xmlrpc [x]
-q --query Testable parameters (eg:"id=1&file=2")
-u --user Set username for bruteforce, default=admin
-w --wordlist Set wordlist (user

ass)
-m --method Set method (GET or POST)
-p --proxy Set proxy (host

ort)
-a --agent Set user-agent
-c --cookie Set cookie
-r --redirect Redirection target url, defaul=True
-h --help Show this help and exit
Examples:
wpseku.py -t
http://www.target.com
wpseku.py -t target.com/wp-admin/admin-ajax.php -q id=1&cat=2 -m POST [-x,-s,-l]
wpseku.py -t target.com/path/wp-content/plugins/hello/hello.php -q id=1&test=2 -m GET [-x,-s,-l]
wpseku.py -t
http://target.com --brute [l,x] --user admin --wordlist dict.txt