• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

xml-rpc

  1. itsMe

    Phyton Wordpress xml-rpc brute force tool source

    wordlist type:   url.tld/wp-login.php|admin|admin Counts only users with administrative privileges as hits. Hidden content
  2. itsMe

    Wordpress XML-RPC + wp-login Bruteforce v2.11

    - refactoring code - add new macros [REVERSE] - example: (ADMIN=NIMDA) - update ssl library - add ssl_x64 (folder \SSL_x64\) - enum 3 users Hidden content
  3. 1

    Exploits TeamCity Agent XML-RPC Command Execution

    This Metasploit module allows remote code execution on TeamCity Agents configured to use bidirectional communication via xml-rpc. In bidirectional mode the TeamCity server pushes build commands to the Build Agents over port TCP/9090 without requiring authentication. Up until version 10 this was...
Back
Top