OP 14 November, 2019 - 01:31 AM
(This post was last modified: 17 December, 2019 - 11:10 PM by Kushd.)
Firstly not my code.
" This is an exploit for Wordpress xmlrpc.php System Multicall function affecting the most current version of Wordpress (3.5.1). The exploit works by sending 1,000+ auth attempts per request to xmlrpc.php in order to "brute force" valid Wordpress users and will iterate through whole wordlists until a valid user response is acquired. It will then selectively acquire and display the valid username and password to login. "
If for whatever reason you can't get the script to work
Read this tutorial and do it manually
" This is an exploit for Wordpress xmlrpc.php System Multicall function affecting the most current version of Wordpress (3.5.1). The exploit works by sending 1,000+ auth attempts per request to xmlrpc.php in order to "brute force" valid Wordpress users and will iterate through whole wordlists until a valid user response is acquired. It will then selectively acquire and display the valid username and password to login. "
If for whatever reason you can't get the script to work
Read this tutorial and do it manually