Flunym0us has been developed in Python. Flunym0us performs dictionary attacks against Web sites. By default, Flunym0us includes a dictionary for Wordpress and other for Moodle.
Operation
Flunym0us requires python.
Arguments allowed:
-h, --help: Show this help message and exit
-wp, --wordpress: Scan WordPress site
-mo, --moodle: Scan Moodle site
-H HOST, --host HOST: Website to be scanned
-w WORDLIST, --wordlist WORDLIST: Path to the wordlist to use
-t TIMEOUT, --timeout TIMEOUT: Connection timeout
-r RETRIES, --retries RETRIES: Connection retries
-p PROCESS, --process PROCESS: Number of process to use
-T THREADS, --threads THREADS: Number of threads (per process) to use
Versions
Flunym0us is distributed under the terms of GPLv3 license
ChangeLog 1.0:
[+] Search Wordpress Plugins
[+] Search Moodle Extensions
ChangeLog 2.0:
[+] http user-agent hijacking
[+] http referer hijacking
[+] Search Wordpress Version
[+] Search Wordpress Latest Version
[+] Search Version of Wordpress Plugins
[+] Search Latest Version of Wordpress Plugins
[+] Search Path Disclosure Vulnerabilities
[+] Search Wordpress Authors
2 comments
Very helpful article.. I am looking for scan vulnerability online and this tool is good for Wordpress. Thanks for sharing.
Replyhah ! nice posts
Replytest file encryption for free encrypt any file
Post a Comment