WPSeku – A Vulnerability Scanner to Find Security Issues in WordPress

If You Appreciate What We Do Here On TecMint, You Should Consider:

  1. Stay Connected to: Twitter | Facebook | Google Plus
  2. Subscribe to our email updates: Sign Up Now
  3. Get your own self-hosted blog with a Free Domain at ($3.95/month).
  4. Become a Supporter - Make a contribution via PayPal
  5. Support us by purchasing our premium books in PDF format.
  6. Support us by taking our online Linux courses

We are thankful for your never ending support.

Aaron Kili

Aaron Kili is a Linux and F.O.S.S enthusiast, an upcoming Linux SysAdmin, web developer, and currently a content creator for TecMint who loves working with computers and strongly believes in sharing knowledge.

Your name can also be listed here. Got a tip? Submit it here to become an TecMint author.

RedHat RHCE and RHCSA Certification Book
Linux Foundation LFCS and LFCE Certification Preparation Guide

You may also like...

4 Responses

  1. Bruce Ferrell says:
    $ ./wpseku -u  -p s returns: 
    

    ]+[ Searching sql vulns…
    Traceback (most recent call last):
    File “./wpseku.py”, line 805, in
    main.WPSekuMain()
    File “./wpseku.py”, line 776, in WPSekuMain
    WPAttack(self.url,self.path,self.query,self.headers).sqlattack()
    File “./wpseku.py”, line 553, in sqlattack
    params = dict([part.split(‘=’) for part in u.query.split(‘&’)])
    ValueError: dictionary update sequence element #0 has length 1; 2 is required

  2. jsda says:

    I think you should have blurred few more lines…

Got something to say? Join the discussion.

Your email address will not be published. Required fields are marked *