{"id":22080101,"url":"https://github.com/esfelurm/autoexploit","last_synced_at":"2025-07-03T09:32:21.593Z","repository":{"id":203378711,"uuid":"709456884","full_name":"esfelurm/AutoExploit","owner":"esfelurm","description":"Fellow web hacker 👻","archived":false,"fork":false,"pushed_at":"2023-10-29T12:05:42.000Z","size":338,"stargazers_count":45,"open_issues_count":1,"forks_count":12,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-04-01T11:11:08.714Z","etag":null,"topics":["auto-exploit","auto-exploiter","autoexploit","autoexploiter","cms","cracker","esfelurm","exploiter","exploits"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/esfelurm.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-10-24T18:56:46.000Z","updated_at":"2025-03-09T12:53:13.000Z","dependencies_parsed_at":"2023-10-29T13:20:55.779Z","dependency_job_id":null,"html_url":"https://github.com/esfelurm/AutoExploit","commit_stats":null,"previous_names":["esfelurm/autoexploit"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/esfelurm/AutoExploit","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/esfelurm%2FAutoExploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/esfelurm%2FAutoExploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/esfelurm%2FAutoExploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/esfelurm%2FAutoExploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/esfelurm","download_url":"https://codeload.github.com/esfelurm/AutoExploit/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/esfelurm%2FAutoExploit/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":263300498,"owners_count":23445250,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["auto-exploit","auto-exploiter","autoexploit","autoexploiter","cms","cracker","esfelurm","exploiter","exploits"],"created_at":"2024-11-30T23:12:24.441Z","updated_at":"2025-07-03T09:32:21.563Z","avatar_url":"https://github.com/esfelurm.png","language":"Python","readme":"\u003cimg src=\"https://github-production-user-asset-6210df.s3.amazonaws.com/104654028/278869269-dceed458-679b-4160-8fd9-55dd9aaf742e.jpg\"\u003e\n\n# AutoExploit\n\nA powerful tool for finding site vulnerabilities with 108 different exploits ☠️\n\n\u003cimg src=\"https://github.com/esfelurm/AutoExploit/assets/104654028/43462c4b-4bb6-42a2-8490-11aa9e9c0530\"\u003e\n\n### info/opt\n\n- With this tool, you can use the designated exploits so that you can use those vulnerabilities 🔆\n- This tool also has crackers, such as WordPress, Joomla and... 🔆\n- This tool has WordPress, Joomla, etc. cms\n- It also has tools such as Sqli, cpanel, smtp and... 🔆\n- You can easily install this tool even in your Linux or Windows 🔆\n\n## Examples of exploits \n\n- ⚪ Wp_cloudflare\n- ⚪ phpunit\n- ⚪ env\n- ⚪ osCommerce\n- and .......\n\n## Examples of tools \n\n- 🟢 getSMTP\n- 🟢 wso Shell Uploader\n- 🟢 cms\n- and .......\n\n## Examples of cms \n\n- 🟡 Wordpress\n- 🟡 drupal\n- 🟡 joomla\n- 🟡 opencart\n\n`It has shells and special payloads for easier access and penetration into targets `\n\n## Support from\n\n🟢 Linux\n🟢 Windows\n🟡 Termux\n\n\n#### Commands + implementation tips \n\n- Create a file in txt format and put the targets inside them\n- Then copy the targets file to the AutoExploit folder (or give the target file address to the tool\n\nThen enter the following command 👇🏻\n\n```\ngit clone https://github.com/esfelurm/AutoExploit\ncd AutoExploit\npython AutoExploit.py target.txt\n```\nNow it starts testing the exploits   \n\n`If you don't understand, watch the videos below 👇🏻`\n----------------------------------\n\n## educational video Part I\n\n\u003cvideo src=\"https://github-production-user-asset-6210df.s3.amazonaws.com/104654028/277784453-a8b2e977-5a5a-45fc-aab3-2dcf576f70af.mp4\"\u003e\n\u003c/video\u003e\n\n----------------------------------\n\n## educational video Part II\n\n\u003cvideo src=\"https://github-production-user-asset-6210df.s3.amazonaws.com/104654028/277785234-186a3c8f-041f-491e-b13a-bf67c208687a.mp4\"\u003e\n\u003c/video\u003e\n\n----------------------------------\n### Commands used in the video \n\n\u003col\u003e\n\n\u003cli\u003eInstall prerequisites\u003c/li\u003e\nKali 👇🏻\n\n```\nsudo apt update \u0026\u0026 sudo apt upgrade -y\nsudo apt install python3 python3-pip\nsudo apt install git\npip3 install requests\ngit clone https://github.com/esfelurm/AutoExploit\n```\nTermux 👇🏻\n\n```\napt update \u0026\u0026 apt upgrade\npkg install git\npkg install python3\npip install requests\ngit clone https://github.com/esfelurm/AutoExploit\n```\n\n\u003cli\u003eCopy the targets file\u003c/li\u003e\n  \n```\ncp target.txt AutoExploit\n```\n\u003cli\u003eEnter the tools directory\u003c/li\u003e\n\n```\ncd AutoExploit\n```\n\u003cli\u003eWe run the tool \u003c/li\u003e\n\n```\npython AutoExploit.py target.txt\n```\n\u003cli\u003eIf the vulnerability is found and the work is completed, enter the result folder \u003c/li\u003e\n\n```\ncd result\n```\n\n\u003cli\u003eNow open the files named config and you can see the results \u003c/li\u003e\n\u003c/ol\u003e\n\n## Attack example :\n\n- Target : https://westlink.com.my\n\n- image :\n\n\u003cimg src=\"https://github-production-user-asset-6210df.s3.amazonaws.com/104654028/278016851-4876f5d3-e9ab-4d2f-9738-38eb3c91e6a4.jpg\"\u003e\n\n- Info :\n\n```\nAPP_NAME=\"Westlink Group Of Companies\"\nAPP_ENV=local\nAPP_KEY=base64:MKVU0RsaiKzXpRz+AmGyMu/4rOdNPPEvlyXmm3O+BLA=\nAPP_DEBUG=false\nAPP_URL=https://www.westlink.com.my/\n\nLOG_CHANNEL=stack\nLOG_LEVEL=debug\n\nDB_CONNECTION=mysql\nDB_HOST=110.4.45.32\nDB_PORT=3306\nDB_DATABASE=westlin1_sec_westlink_lat_v1\nDB_USERNAME=westlin1_adm1\nDB_PASSWORD=%?xwh%]KYFR-\n\nBROADCAST_DRIVER=log\nCACHE_DRIVER=file\nQUEUE_CONNECTION=sync\nSESSION_DRIVER=file\nSESSION_LIFETIME=120\n\nMEMCACHED_HOST=127.0.0.1\n\nREDIS_HOST=127.0.0.1\nREDIS_PASSWORD=null\nREDIS_PORT=6379\n\nMAIL_MAILER=smtp\nMAIL_HOST=mail.westlink.com.my\nMAIL_PORT=465\nMAIL_USERNAME=sales@westlink.com.my\nMAIL_PASSWORD=8dxtc+wgojx6\nMAIL_ENCRYPTION=ssl\n\n#MAIL_MAILER=smtp\n#MAIL_HOST=smtp.mailtrap.io\n#MAIL_PORT=2525\n#MAIL_USERNAME=d5d5c2b307fe1f\n#MAIL_PASSWORD=4912217d7c6151\n#MAIL_ENCRYPTION=tls\n\nMAIL_FROM_ADDRESS=null\nMAIL_FROM_NAME=\"${APP_NAME}\"\n\nAWS_ACCESS_KEY_ID=\nAWS_SECRET_ACCESS_KEY=\nAWS_DEFAULT_REGION=us-east-1\nAWS_BUCKET=\n\nPUSHER_APP_ID=\nPUSHER_APP_KEY=\nPUSHER_APP_SECRET=\nPUSHER_APP_CLUSTER=mt1\n\nMIX_PUSHER_APP_KEY=\"${PUSHER_APP_KEY}\"\nMIX_PUSHER_APP_CLUSTER=\"${PUSHER_APP_CLUSTER}\"\n\nBUSS_ADMIN=\"/admin_wlx\"\nBUSS_NAME=\"Westlink Engineering Sdn. Bhd\"\nBUSS_PHONE=\"+607-3539737\"\nBUSS_EMAIL=\"info@westlink.com.my\"\n```\n\n## Run successfully\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fesfelurm%2Fautoexploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fesfelurm%2Fautoexploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fesfelurm%2Fautoexploit/lists"}