Simple WPScan commands
Get your API token from wpvulndb.com if you also want the vulnerabilities associated with the detected plugin displaying. | |
For all plugins with known vulnerabilities: | |
wpscan --url example.com -e vp --plugins-detection mixed --api-token YOUR_TOKEN | |
For all plugins in our database (could take a very long time): | |
wpscan --url example.com -e ap --plugins-detection mixed --api-token YOUR_TOKEN | |
To bypass some simple WAFs use the "--random-user-agent" option. |
This comment has been minimized.
This comment has been minimized.
Try again, we had some issues with the API this morning. And update your version of WPScan. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
This comment has been minimized.
That's not work for me
