π·WordPress
Manual
Information Gathering
# get wordpress version
curl https://victim.com/ | grep 'content="WordPress'Users / IP
# get author name = potential user
curl -s -I -X GET http://blog.example.com/?author=1xmlrpc.php
Active
Exploit
SSRF
Try
WPScan
Commands - with API
Default
Private Commands - with API
Last updated