This repository was archived by the owner on Oct 22, 2020. It is now read-only.
v2.0
WordPress Exploit Framework 2.0 is here! 🎉
This version is NOT compatible with 1.x. To upgrade to 2.0, remove your previous installation and install the gem by running gem install wpxf
.
New Features
- Loot is now stored into a
.wpxf
directory inside your home directory - A data store (by default sqlite3) is now used to store information gathered by modules
- Harvested credentials can be viewed using the
creds
command - Gathered loot can be viewed using the
loot
command - Support for workspaces is now available and can be utilised using the
workspace
command - Numerous improvements to the API have been introduced
- Custom modules can now be added to the
.wpxf
directory
Using Custom Modules
If you have a custom module you wish to use, you can now place it within the ~/.wpxf/modules/
directory and then load it in the CLI using the normal use {exploit_path}
syntax.