https://github.com/hackfutsec/joomla
Complet Tool exploit joomla servers
https://github.com/hackfutsec/joomla
brute-force cybersecurity detection ethical-hacking exploit exploitation joomla lfi-exploitation python xss-exploitation
Last synced: 8 months ago
JSON representation
Complet Tool exploit joomla servers
- Host: GitHub
- URL: https://github.com/hackfutsec/joomla
- Owner: HackfutSec
- License: mit
- Created: 2025-04-18T19:54:37.000Z (9 months ago)
- Default Branch: main
- Last Pushed: 2025-04-18T23:16:37.000Z (9 months ago)
- Last Synced: 2025-04-19T07:54:22.820Z (9 months ago)
- Topics: brute-force, cybersecurity, detection, ethical-hacking, exploit, exploitation, joomla, lfi-exploitation, python, xss-exploitation
- Language: Python
- Homepage: https://github.com/HackfutSec/Joomla.git
- Size: 13.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Joomla Pentest Pro 🔍
## Key Features 🛠️
- ✅ **Smart Brute Force** with CSRF handling
- ✅ **Vulnerability detection** (LFI, XSS, SQLi)
- ✅ **Integrated com_sef LFI exploit**
- ✅ **200+ common passwords** wordlist
- ✅ **Configurable multi-threading** (up to 50 threads)
- ✅ **Randomized User-Agents** for WAF evasion
- ✅ **Multi-URL scanning** via file input
## Installation ⚙️
### Requirements
- Python 3.8+
- Required libraries:
```bash
pip install requests beautifulsoup4 argparse
git clone https://github.com/HackfutSec/Joomla.git
cd Joomla
# Single target scan
python joomla.py -u http://example.com
# Scan with custom wordlists
python joomla.py -f urls.txt -l users.txt -p passwords.txt
# Advanced options
python joomla.py -u http://example.com -t 30 -d 0.2
Full Options
Option Description Default Value
-u URL Target URL -
-f FILE File containing target URLs -
-l USERLIST Custom username wordlist Built-in
-p PASSLIST Custom password wordlist Built-in