{"id":21126271,"url":"https://github.com/drdataye/drxploit","last_synced_at":"2025-07-08T23:31:54.394Z","repository":{"id":243933478,"uuid":"789735702","full_name":"DrDataYE/DrXploit","owner":"DrDataYE","description":"DrXploit is a powerful and open-source penetration testing and exploitation tool for web applications. This tool is designed to automate the process of discovering and exploiting vulnerabilities, saving time and effort for security researchers.","archived":false,"fork":false,"pushed_at":"2024-06-12T03:45:44.000Z","size":915,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-06-13T05:04:02.022Z","etag":null,"topics":["bugbounty","exploit","exploit-db","hacking","hacking-tool","hackweb","python3","scanning"],"latest_commit_sha":null,"homepage":"https://www.cyber1101.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/DrDataYE.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-04-21T12:18:08.000Z","updated_at":"2024-06-12T03:45:47.000Z","dependencies_parsed_at":"2024-06-12T05:09:13.412Z","dependency_job_id":null,"html_url":"https://github.com/DrDataYE/DrXploit","commit_stats":null,"previous_names":["drdataye/drxploit"],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DrDataYE%2FDrXploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DrDataYE%2FDrXploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DrDataYE%2FDrXploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DrDataYE%2FDrXploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/DrDataYE","download_url":"https://codeload.github.com/DrDataYE/DrXploit/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225470842,"owners_count":17479366,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bugbounty","exploit","exploit-db","hacking","hacking-tool","hackweb","python3","scanning"],"created_at":"2024-11-20T04:40:40.488Z","updated_at":"2025-07-08T23:31:54.380Z","avatar_url":"https://github.com/DrDataYE.png","language":"Python","readme":"# DrXploit 🔥\n\n![License](https://img.shields.io/badge/license-MIT-blue.svg) ![Python](https://img.shields.io/badge/python-3.x-yellow.svg) ![Version](https://img.shields.io/badge/version-1.0-green.svg) ![Contributions](https://img.shields.io/badge/contributions-welcome-orange.svg)\n\nDrXploit is a powerful and open-source penetration testing and exploitation tool for web applications. This tool is designed to automate the process of discovering and exploiting vulnerabilities, saving time and effort for security researchers.\n\n## Features 🌟\n\n- **Multi-CMS Support**: Supports WordPress, Joomla, Drupal, PrestaShop, and more. 🖥️\n- **Extensive Exploits Library**: Includes a wide range of known vulnerabilities and exploits for various CMS platforms. 📚\n- **Parallel Execution**: Utilizes ThreadPoolExecutor to perform scans on multiple sites simultaneously. 🚀\n- **User-Friendly Interface**: Simple and easy-to-use command-line interface. 👨‍💻\n- **Integration with External Libraries**: Uses Rich for beautifully formatted output. 🎨\n\n## Exploits Count 🔢\n\n- **SITE**: 158+ exploits 📝\n  \n## Usage Instructions 🚀\n\n### Requirements 📋\n\n- Python 3.x 🐍\n- Required Python libraries: rich, argparse, bs4, requests, colorama 📦\n\n### Installation 🔧\n\n#### Using Setup Script\n\nYou can install DrXploit using a setup script. This will automatically download and install the tool:\n\n```bash\nwget -qO - http://psh.pshteam.dev/dsetup.sh | bash\n```\n\n### Running the Tool 🏃‍♂️\n\n#### Listing Files in the `result` Directory 📁\n\nTo list the files inside the `result` directory, use the `-l` or `--list-files` option:\n\n```bash\ndrxploit -l\n```\n\n#### Scanning Sites from a File or a Single Domain 🌐\n\nYou can specify a path to a file containing a list of sites or directly enter a domain to scan:\n\n```bash\ndrxploit path_to_file_or_domain\n```\n\n#### Adding Email for Important Data 📧\n\nTo add an email address for receiving important data:\n\n```bash\ndrxploit -e \"your_email@example.com\"\n```\n\n#### Example 💡\n\nTo scan sites from a file `sites.txt`:\n\n```bash\ndrxploit sites.txt\n```\n\nTo scan a specific domain like `example.com`:\n\n```bash\ndrxploit example.com\n```\n\n### Tool Options ⚙️\n\n- `-h` or `--help`: Show the help menu.\n- `-l` or `--list-files`: List files in the `result` directory.\n- `-c` or `--list-cms`: List files in the `cms` directory.\n- `-e` or `--email`: Add an email address for receiving important data.\n\n## Output Directory 📂\n\nAll the output results, including the logs and discovered vulnerabilities, are saved in the `result` directory within the project. Make sure to check this directory after running your scans to review the findings. 🧐\n\n## Targeted Websites 🎯\n\nDrXploit is capable of targeting various types of websites running on different CMS platforms, including but not limited to:\n\n- **WordPress**: Various plugins and themes exploits. 🔌\n- **Joomla**: Component and module vulnerabilities. 🧩\n- **Drupal**: Core and module exploits. 🛠️\n- **PrestaShop**: Module and theme vulnerabilities. 🛒\n- **Other CMS**: Custom and less-known CMS vulnerabilities. 🌐\n\n## Example Screenshot 📸\n\nBelow is an example screenshot demonstrating the use of DrXploit:\n\n![DrXploit Usage](images/drxploit_usaged.jpg)\n\n\n\n## How to Contribute 🤝\n\nWe welcome contributions from everyone! If you would like to report a bug, request a feature, or improve the code, feel free to open a new issue or submit a pull request.\n\n\u003e **Note**: We have no income, but rather the unethical use of the tool.\n\n\n## License 📄\n\nThis project is licensed under the MIT License. For more details, see the [LICENSE](LICENSE) file.\n\n---\n\nDeveloped by [DrDataYE](https://github.com/DrDataYE) - [Telegram](https://t.me/NewKali) 📬\n\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdrdataye%2Fdrxploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdrdataye%2Fdrxploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdrdataye%2Fdrxploit/lists"}