Author: Trix Cyrus
Copyright: © 2025 Trixsec Org
Maintained: Yes
Brute-XMLRPC is a Python-based tool designed to perform brute force attacks on WordPress sites through the xmlrpc.php endpoint. It can also enumerate users via the WordPress JSON API to enhance the attack surface.
- Multi-threaded Brute Force: Perform brute force attacks using multiple threads for efficiency.
- IP Spoofing: Generate random IP addresses for headers like
X-Forwarded-ForandX-Real-IPto enhance anonymity. - Custom Headers: Use a variety of headers to mimic real-world browser requests.
- User Enumeration: Retrieve user information from the WordPress JSON API.
- Interactive Input: Easy-to-use prompts for user input and configuration.
- Progress Display: Real-time display of brute force attempts and progress.
-
Proxy Handling with
aiohttp-socks:- Integrated
aiohttp-socksfor SOCKS5 proxy support, ensuring compatibility with Tor. - Replaced direct proxy arguments with
ProxyConnectorfor streamlined connection management.
- Integrated
-
Enhanced Header and User-Agent Spoofing:
- Expanded
user_agentslist with mobile browsers, old browsers, and bots. - Broadened
referer_domainsand added randomizedAccept-Language,Accept-Encoding,Forwarded,DNT,Origin, andCache-Controlheaders for increased variety.
- Expanded
-
Payload Variation in
check_xmlrpc_available:- Introduced random payloads (
system.getCapabilities,system.methodHelp, etc.) for more robust testing.
- Introduced random payloads (
-
Retry Logic and Rate Limiting:
- Added retry mechanism with delays and handling of
429responses usingRetry-Afterheader.
- Added retry mechanism with delays and handling of
-
WAF Detection:
- Added
check_for_wafto identify 403 responses indicating a WAF and log detections inWAF_DETECTED_LOG.
- Added
-
Deprecated Method Removal:
- Replaced
SocksConnector.createwithProxyConnectorfor modern and non-deprecated proxy handling.
- Replaced
- Python 3.x
- Required Python packages:
requestscoloramatermcolorconcurrent.futures
You can install the required packages using the following command:
pip install requests colorama termcolor- Clone the repository:
git clone https://github.com/TrixSec/Brute-XMLRPC.git cd Brute-XMLRPC
-
Run the script:
python brutecxmlrpc.py
-
Follow the prompts to:
- Enter the target WordPress site URL.
- Check for
xmlrpc.phpavailability. - Choose to enumerate users via the WordPress JSON API.
- Provide usernames and passwords manually or via files.
- Set the number of threads for the brute force attack.
This tool is intended for educational purposes only. Unauthorized use of this tool to compromise or damage systems is illegal and unethical. The developers are not responsible for any misuse or damage caused by this tool.