wpscan-analyze
Analyzes wpscan json output and checks for vulnerabilities
wpscan checks WordPress installation for outdated versions, plugins, and themes. wpscan analysis wpscan's JSON output and signals results via exit status, JSON and human readable out.
Basic Usage
wpscan needs an input file in JSON format generated by a run of wpscan against a WordPress installation.
Run wpscan
wpscan --url https://lukas.pustina.de --update --output wpscan.json --format json
Run wpscan-analyze
> wpscan
)
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
> echo
Help
man 1 wpscan-analyze
Installation
Ubuntu [x86_64]
Please add my PackageCloud open source repository and install wpscan-analyze via apt.
|
Linux Binaries [x86_64]
There are binaries available at the GitHub release page. The binaries get compiled on Ubuntu.
macOS Binaries [x86_64]
There are binaries available at the GitHub release page.
Sources
Please install Rust via rustup and then run
Postcardware
You're free to use wpscan-analyze. If you find it useful, I would highly appreciate you sending me a postcard from your hometown mentioning how you use wpscan-analyze. My work address is
Lukas Pustina
CenterDevice GmbH
Rheinwerkallee 3
53227 Bonn
German