Vulnx - Cms As Well As Vulnerabilites Detector As Well As An Intelligent Car Rhythm Out Injector


Vulnx is a cms in addition to vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target in addition to fast scanner in addition to informations gathering similar subdomains, ipaddresses, country, org, timezone, region, ans in addition to to a greater extent than ...
Instead of injecting musical rhythm out in addition to checking it industrial plant similar all the other tools do, vulnx analyses the answer amongst in addition to recieve if musical rhythm out success uploaded or no. vulnx is searching for urls amongst dorks.

Features
  • Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
  • Target informations gatherings
  • Target Subdomains gathering
  • Multi-threading on demand
  • Checks for vulnerabilites
  • Auto musical rhythm out injector
  • Exploit dork searcher

Exploits


Joomla
  • Com Jce
  • Com Jwallpapers
  • Com Jdownloads
  • Com Weblinks
  • Com Fabrik
  • Com Jdownloads Index
  • Com Foxcontact
  • Com Blog
  • Com Users
  • Com Ads Manager
  • Com Sexycontactform
  • Com Media
  • Mod_simplefileupload
  • Com Facileforms

Wordpress

Drupal
  • Add Admin
  • Drupal BruteForcer
  • Drupal Geddon2

PrestaShop
  • attributewizardpro
  • columnadverts
  • soopamobile
  • pk_flexmenu
  • pk_vertflexmenu
  • nvn_export_orders
  • megamenu
  • tdpsthemeoptionpanel
  • psmodthemeoptionpanel
  • masseditproduct
  • blocktestimonial
  • soopabanners
  • Vtermslideshow
  • simpleslideshow
  • productpageadverts
  • homepageadvertise
  • homepageadvertise2
  • jro_homepageadvertise
  • advancedslider
  • cartabandonmentpro
  • cartabandonmentproOld
  • videostab
  • wg24themeadministration
  • fieldvmegamenu
  • wdoptionpanel

Opencart
  • Opencart BruteForce

Available command line options
READ VULNX WIKI
usage: vulnx [options]    -u --url              url target to scan   -D --dorks            search webs amongst dorks   -o --output           specify output directory   -t --timeout          http requests timeout   -c --cms-info         search cms info[themes,plugins,user,version..]   -e --exploit          searching vulnerability & run exploits   -w --web-info         spider web informations gathering   -d --domain-info      subdomains informations gathering   -l, --dork-list       listing names of dorks exploits   --threads             number of threads

Docker
VulnX tin survive launched inwards docker.
$ git clone https://github.com/anouarbensaad/VulnX.git $ cd VulnX $ docker railroad train -t vulnx ./docker/ $ docker run -it --name vulnx vulnx:latest -u http://exemple.com
brand a local book to persuasion the results into a logfile
$ docker run -it --name vulnx -v "$PWD/logs:/VulnX/logs" vulnx:latest -u http://exemple.com

Install VulnX
$ git clone https://github.com/anouarbensaad/VulnX.git $ cd VulnX $ chmod + x install.sh $ ./install.sh
Now run vulnx

example ascendancy amongst options : settimeout=3 , cms-gathering = all , -d subdomains-gathering , run --exploits
vulnx -u http://example.com --timeout three -c all -d -w --exploit

example ascendancy for searching dorks : -D or --dorks , -l --list-dorks
vulnx --list-dorks provide tabular array of exploits name. vulnx -D blaze provide urls establish amongst blaze dork

VulnX Wiki • How To Use • Compatibility