plecost v0.2.2-8 Beta released

Wordpress finger printer tool search and retrieve information about the plugins versions installed in Wordpress systems.

It can analyze a single URL or perform an analysis based on the results indexed by Google. Additionally displays CVE code associated with each plugin, if there.

JPEG - 2.2 kb

Libraries

Plecost works in two modes. On the one hand by analyzing a single URL and the other analyzing the results of Google searches (-G).

Google search options:
   -l num    : Limit number of results for each plugin in google.
   -G        : Google search mode
   
Options:
   -n        : Number of plugins to use (Default all - more than 7000).
   -c        : Check plugins only with CVE associated.
   -R file   : Reload plugin list. Use -n option to control the size (This take several minutes)
   -o file   : Output file. (Default "output.txt")
   -i file   : Input plugin list. (Need to start the program)
   -s time   : Min sleep time between two probes. Time in seconds. (Default 10)
   -M time   : Max sleep time between two probes. Time in seconds. (Default 20)
   -t num    : Number of threads. (Default 1)
   -h        : Display help. (More info: http://iniqua.com/labs/)

More information: here

Post scriptum


Comments

Related Articles

Enumeration
Information Gathering
plecost