Advertisement
sec4safe

Untitled

Feb 27th, 2020
128
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.94 KB | None | 0 0
  1. import requests, os, time
  2. from colorama import Fore
  3. #Sec4Safe Uploaded 2020 <3 MNARDL
  4.  
  5. #Get Target
  6. print(f"{Fore.BLUE}")
  7. os.system ('clear')
  8. time.sleep(2)
  9. os.system('figlet Sec4Safe')
  10. time.sleep(2)
  11. target = input(f"{Fore.BLUE}website> {Fore.WHITE}")
  12. get = requests.get(f"http://api.hackertarget.com/reverseiplookup/?q={target}").text
  13.  
  14. #Create List
  15. open_file = open(f"wpfind.txt","a")
  16. open_file.write(get)
  17. open_file.close()
  18.  
  19. #Find Wordpress
  20. file = open(f"wpfind.txt","r").readlines()
  21. for wordpress in file:
  22. wordpress = wordpress.strip()
  23. try:
  24. req = requests.get(f"http://{wordpress}/wp-login.php").text
  25. except:
  26. continue
  27. if 'WordPress' in req:
  28. print(f"{Fore.GREEN}Wordpress {Fore.WHITE}> http://{wordpress}/")
  29. result = open(f"itswp.txt","a")
  30. result.write(f"http://{wordpress}/\n")
  31. result.close()
  32. else:
  33. print(f"{Fore.RED}Unknown {Fore.WHITE}> http://{wordpress}/")
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement