Last active
August 13, 2022 07:20
-
-
Save ethicalhack3r/3f04a3b59bf3ff74d199add297edb621 to your computer and use it in GitHub Desktop.
Simple WPScan commands
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Get your API token from wpvulndb.com if you also want the vulnerabilities associated with the detected plugin displaying. | |
For all plugins with known vulnerabilities: | |
wpscan --url example.com -e vp --plugins-detection mixed --api-token YOUR_TOKEN | |
For all plugins in our database (could take a very long time): | |
wpscan --url example.com -e ap --plugins-detection mixed --api-token YOUR_TOKEN | |
To bypass some simple WAFs use the "--random-user-agent" option. |
Try again, we had some issues with the API this morning.
And update your version of WPScan.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
That's not work for me
