Author: Trix Cyrus
Copyright: © 2025 Trixsec Org
Maintained: Yes
Brute-XMLRPC is a Python-based tool designed to perform brute force attacks on WordPress sites through the xmlrpc.php
endpoint. It can also enumerate users via the WordPress JSON API to enhance the attack surface.
- Multi-threaded Brute Force: Perform brute force attacks using multiple threads for efficiency.
- IP Spoofing: Generate random IP addresses for headers like
X-Forwarded-For
andX-Real-IP
to enhance anonymity. - Custom Headers: Use a variety of headers to mimic real-world browser requests.
- User Enumeration: Retrieve user information from the WordPress JSON API.
- Interactive Input: Easy-to-use prompts for user input and configuration.
- Progress Display: Real-time display of brute force attempts and progress.
-
Proxy Handling with
aiohttp-socks
:- Integrated
aiohttp-socks
for SOCKS5 proxy support, ensuring compatibility with Tor. - Replaced direct proxy arguments with
ProxyConnector
for streamlined connection management.
- Integrated
-
Enhanced Header and User-Agent Spoofing:
- Expanded
user_agents
list with mobile browsers, old browsers, and bots. - Broadened
referer_domains
and added randomizedAccept-Language
,Accept-Encoding
,Forwarded
,DNT
,Origin
, andCache-Control
headers for increased variety.
- Expanded
-
Payload Variation in
check_xmlrpc_available
:- Introduced random payloads (
system.getCapabilities
,system.methodHelp
, etc.) for more robust testing.
- Introduced random payloads (
-
Retry Logic and Rate Limiting:
- Added retry mechanism with delays and handling of
429
responses usingRetry-After
header.
- Added retry mechanism with delays and handling of
-
WAF Detection:
- Added
check_for_waf
to identify 403 responses indicating a WAF and log detections inWAF_DETECTED_LOG
.
- Added
-
Deprecated Method Removal:
- Replaced
SocksConnector.create
withProxyConnector
for modern and non-deprecated proxy handling.
- Replaced
- Python 3.x
- Required Python packages:
requests
colorama
termcolor
concurrent.futures
You can install the required packages using the following command:
pip install requests colorama termcolor
- Clone the repository:
git clone https://github.com/TrixSec/Brute-XMLRPC.git cd Brute-XMLRPC
-
Run the script:
python brutecxmlrpc.py
-
Follow the prompts to:
- Enter the target WordPress site URL.
- Check for
xmlrpc.php
availability. - Choose to enumerate users via the WordPress JSON API.
- Provide usernames and passwords manually or via files.
- Set the number of threads for the brute force attack.
This tool is intended for educational purposes only. Unauthorized use of this tool to compromise or damage systems is illegal and unethical. The developers are not responsible for any misuse or damage caused by this tool.