WPSploit alternatives
Looking for an alternative tool to replace WPSploit? During the review of WPSploit we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Top 3
- graudit (static code analysis tool)
- Bandit (Python static code analyzer)
- Shellharden (linting tool for shell scripts)
These tools are ranked as the best alternatives to WPSploit.
Alternatives (by score)
graudit
Introduction
Analysis of source code helps to find programming flaws including those that can lead to software vulnerabilities. Graudit helps to uncover these by searching through the files and discover possible flaws. The tool supports languages like ASP, C, Perl, PHP, Python, and others.
Project details
graudit is written in shell script.
Strengths and weaknesses
- + The source code is easy to read and understand
- + Tool is easy to use
- + Used language is shell script
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Code analysis
Bandit
Introduction
Bandit is a tool that can be used during development or afterward. Typically this is used by developers to find common security issues in Python code before putting the code in production. Another use-case would be to use this tool to analyze existing projects and find possible flaws.
Project details
Bandit is written in Python.
Strengths and weaknesses
- + More than 50 contributors
- + The source code of this software is available
- + Supported by a large company
Typical usage
- Code analysis
Shellharden
Introduction
Shellharden helps to detect flaws in shell scripts that may result in vulnerabilities. While being similar to Shellcheck, this tool can apply the suggested changes to a shell script.
Project details
Shellharden is written in Rust.
Strengths and weaknesses
- + Tool is easy to use
- + More than 3000 GitHub stars
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Code analysis
PyT (Python Taint)
Introduction
Python Taint (or PyT) is a static code analyzer for Python scripts and applications. It tries to discover vulnerabilities or other possible weaknesses.Project details
PyT is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Code analysis
Vane
Introduction
Vane is a forked project of the now non-free popular WordPress vulnerability scanner WPScan.Project details
Vane is written in Ruby.
Strengths and weaknesses
- + More than 25 contributors
- + The source code of this software is available
Typical usage
- Application security
- Web application analysis
Wordpresscan
Introduction
Tools like WordPresscan are useful to perform vulnerability scans on the popular WordPress platform. It can be used during development and on existing installations.
Project details
Wordpresscan is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Application security
- Penetration testing
- Web application analysis
WordPress Exploit Framework (WPXF)
Introduction
This framework is a tool that can be used as part of the pentesters toolbox. When running the tool, you will have to define a host, exploit, and payload. The tool is less friendly for beginners, but more experienced pentesters will find no difficulty in using it.
Project details
WordPress Exploit Framework is written in Ruby.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
- - Has longer learning curve
Typical usage
- Penetration testing
- Security assessment
- Vulnerability scanning
Wordstress
Introduction
WordPress is a popular choice among content management systems (CMS). Powering many websites and blogs, it is also a popular target. So regular updates and security testing can help to reduce the risk. WordStress can help with this testing.
Project details
Wordstress is written in Ruby.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Application security
- Vulnerability scanning
- Web application analysis
gauntlt
Introduction
Gauntlt allows you to run different attacks on your code with the goal to build better software and withstand the biggest threats in existence.
Project details
gauntlt is written in Ruby.
Strengths and weaknesses
- + More than 10 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Code analysis
angr
Introduction
Tools like angr are great for performing in-depth analysis of binaries. This could be the analysis of an unknown binary, like a collected malware sample.
Project details
angr is written in Python.
Strengths and weaknesses
- + More than 50 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Binary analysis
- Malware analysis
droopescan
Introduction
Droopescan can be used to test the security of several Content Management Systems (CMS). It mainly focuses on Drupal, SilverStripe, and Wordpress installations.
Project details
droopescan is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Web application analysis
WPScan
Introduction
WPScan can scan WordPress installations and determine if there are vulnerabilities in a particular installation.
Project details
WPScan is written in Ruby.
Strengths and weaknesses
- + More than 25 contributors
- + More than 2000 GitHub stars
- + The source code of this software is available
- - Software usage is restricted (e.g. commercially)
Typical usage
- Penetration testing
- Security assessment
- Vulnerability scanning
Brakeman
Introduction
Brakeman is a static code analysis tool for Ruby on Rails to perform a security review. It comes as an open source project with optional commercial support.Project details
Brakeman is written in Ruby.
Strengths and weaknesses
- + Commercial support available
- + The source code of this software is available
Typical usage
- Code analysis
Cppcheck
Introduction
Cppcheck is a static code analysis tool for C and C++ code. It helps to discover bugs that would not be picked up by compilers, yet avoid any false positives.Project details
Jackhammer
Introduction
The tool uses RBAC (Role Based Access Control) with different levels of access. Jackhammer uses several tools to do dynamic and static code analysis (e.g. for Java, Ruby, Python, and Nodejs). It checks also for vulnerabilities in libraries. Due to its modular architecture, it can use several scanners out of the box, with options to add your own.
The Jackhammer project was initially added to GitHub on the 8th of May, 2017.
Project details
Jackhammer is written in Ruby.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Collaboration
- Information sharing
Shellyzer
Introduction
Shell scripts are easy to create and often used by system administrator and developers. Although the language is fairly easy, there is a good number of best practices when creating them. Tools like Shellyzer can help auditing these scripts and improve the code or discover vulnerabilities.
Project details
Shellyzer is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - Unknown project license
Typical usage
- Code analysis
CMSmap
Introduction
CMSmap helps saving time in the process of detecting what CMS is used for a given web application. It performs reconnaissance and can do additional vulnerability scanning.
Project details
CMSmap is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Application testing
- Information gathering
- Vulnerability scanning
- Web application analysis
flunym0us
Introduction
Flunym0us is a security scanner for WordPress and Moodle installations. The tool tests the security of the installation by performing enumeration attempts.Project details
flunym0us is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Vulnerability scanning
- Web application analysis
wpvulndb_cmd
Introduction
wpvulndb_cmd is a command-line security tool to perform a vulnerability scan on WordPress installations. It uses WP-CLI and the WPScan vulnerability database.Project details
wpvulndb_cmd is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
- Web application analysis
Plecost
Introduction
Plecost is a security tool to fingerprint WordPress installations and find available vulnerabilities.Project details
Plecost is written in Python.
Strengths and weaknesses
- + Screen output is colored
- + The source code of this software is available
Typical usage
- Web application analysis
Spaghetti
Introduction
Spaghetti is a light tool that can fingerprint and enumerate common locations in web applications. It is powerful in detection commonly used web frameworks and content management systems (CMS). This makes the tool useful as an additional scanner in your toolkit. From the defensive side, it is good to learn what information is leaked, so additional hardening can be applied.
Project details
Spaghetti is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Penetration testing
- Vulnerability scanning
- Vulnerability testing
WPForce
Introduction
This toolkit is fairly new and consists of WPForce and Yertle. As the name implies, the first component has the focus on brute force attacking of login credentials. When admin credentials have been found, it is Yertle that allows uploading a shell. Yertle also has post-exploitation modules for further research.
Project details
WPForce is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Penetration testing
- Security assessment
- Vulnerability scanning
WPSeku
Introduction
With WPSeku a WordPress installation can be tested for the presence of security issues. Some examples are cross-site scripting (XSS), sql injection, and local file inclusion. The tool also tests for the presence of default configuration files. These files may reveal version numbers, used themes and plugins.
Project details
WPSeku is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - Unknown project license
Typical usage
- Penetration testing
- Security assessment
- Vulnerability scanning
Some relevant tool missing as an alternative to WPSploit? Please contact us with your suggestion.