Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Dionach/CMSmap
CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.
https://github.com/Dionach/CMSmap
Last synced: 11 days ago
JSON representation
CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.
- Host: GitHub
- URL: https://github.com/Dionach/CMSmap
- Owner: dionach
- License: gpl-3.0
- Created: 2018-09-20T06:55:41.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2021-12-01T05:48:48.000Z (almost 3 years ago)
- Last Synced: 2024-10-16T01:42:41.967Z (24 days ago)
- Language: Python
- Size: 435 KB
- Stars: 1,027
- Watchers: 27
- Forks: 254
- Open Issues: 26
-
Metadata Files:
- Readme: README.md
- Contributing: .github/CONTRIBUTING.md
- License: LICENSE.txt
Awesome Lists containing this project
- awesome-bbht - CMSmap - CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. (CMS / XSS)
- awesome-bbht - CMSmap - CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. (CMS / XSS)
- awesome-bugbounty-tools - CMSmap - CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. (Miscellaneous / CMS)
- awesome-termux-hacking - CMSmap - CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. .[![->](https://img.shields.io/github/stars/Dionach/CMSmap.svg?style=social&label=Star&maxAge=2592000)](https://github.com/Dionach/CMSmap/stargazers/) (Uncategorized / Uncategorized)
- StarryDivineSky - dionach/CMSmap
README
CMSmap
======CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of CMSmap is to integrate common vulnerabilities for different types of CMSs in a single tool.
At the moment, CMSs supported by CMSmap are WordPress, Joomla, Drupal and Moodle.
Please note that this project is an early state. As such, you might find bugs, flaws or mulfunctions.
Use it at your own risk!Preview
=====
* https://asciinema.org/a/MELa2nUcrtATqnDLnc0ig8rcTInstallation
=====
You can download the latest version of CMSmap by cloning the GitHub repository:git clone https://github.com/Dionach/CMSmap
Then you need to configure the `edbtype` and `edbpath` settings in the `cmsmap.conf`. Use `GIT` if you have a local Git repository of Exploit-db :
[exploitdb]
edbtype = GIT
edbpath = /opt/exploitdb/Alternatively, use `APT` if you have installed the `debian` exploitdb package. For Kali, use the following settings :
[exploitdb]
edbtype = APT
edbpath = /usr/share/exploitdb/If you would like to run `cmsmap` from anywhere in your system you can install it with `pip3` :
cd CMSmap
pip3 install .To uninstall it :
pip3 uninstall cmsmap -y
Usage
=====
usage: cmsmap [-f W/J/D] [-F] [-t] [-a] [-H] [-i] [-o] [-E] [-d] [-u] [-p]
[-x] [-k] [-w] [-v] [-h] [-D] [-U W/J/D]
[target]
CMSmap tool v1.0 - Simple CMS Scanner
Author: Mike Manzotti
Scan:
target target URL (e.g. 'https://example.com:8080/')
-f W/J/D, --force W/J/D
force scan (W)ordpress, (J)oomla or (D)rupal
-F, --fullscan full scan using large plugin lists. False positives and slow!
-t , --threads number of threads (Default 5)
-a , --agent set custom user-agent
-H , --header add custom header (e.g. 'Authorization: Basic ABCD...')
-i , --input scan multiple targets listed in a given file
-o , --output save output in a file
-E, --noedb enumerate plugins without searching exploits
-c, --nocleanurls disable clean urls for Drupal only
-s, --nosslcheck don't validate the server's certificate
-d, --dictattack run low intense dictionary attack during scanning (5 attempts per user)
Brute-Force:
-u , --usr username or username file
-p , --psw password or password file
-x, --noxmlrpc brute forcing WordPress without XML-RPC
Post Exploitation:
-k , --crack password hashes file (Require hashcat installed. For WordPress and Joomla only)
-w , --wordlist wordlist file
Others:
-v, --verbose verbose mode (Default false)
-h, --help show this help message and exit
-D, --default rum CMSmap with default options
-U, --update use (C)MSmap, (P)lugins or (PC) for both
Examples:
cmsmap.py https://example.com
cmsmap.py https://example.com -f W -F --noedb -d
cmsmap.py https://example.com -i targets.txt -o output.txt
cmsmap.py https://example.com -u admin -p passwords.txt
cmsmap.py -k hashes.txt -w passwords.txtContribution guidelines
=====
If you want to contribute to CMSmap, be sure to review the [contribution
guidelines](.github/CONTRIBUTING.md).Disclaimer
=====
Usage of CMSmap for attacking targets without prior mutual consent is illegal.
It is the end user's responsibility to obey all applicable local, state and federal laws.
Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.