wpscan-analyze
Analyzes wpscan json output and checks for vulnerabilities
wpscan checks WordPress installation for outdated versions, plugins, and themes. wpscan-analyze
analyses wpscan
's JSON output and signals results via exit status, JSON and human readable output.
Basic Usage
wpscan
needs an input file in JSON format generated by a run of wpscan
against a WordPress installation.
Run wpscan
wpscan --url https://lukas.pustina.de --update --output wpscan.json --format json
Run wpscan-analyze
> wpscan
)
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
> echo
Help
man 1 wpscan-analyze
Installation
Ubuntu [x86_64]
Please add my PackageCloud open source repository and install wpscan-analyze
via apt.
|
Linux Binaries [x86_64]
There are binaries available at the GitHub release page. The binaries get compiled on Ubuntu.
macOS Binaries [x86_64]
There are binaries available at the GitHub release page.
Sources
Please install Rust via rustup and then run
Postcardware
You're free to use wpscan-analyze
. If you find it useful, I would highly appreciate you sending me a postcard from your hometown mentioning how you use wpscan-analyze
. My work address is
Lukas Pustina
CenterDevice GmbH
Rheinwerkallee 3
53227 Bonn
German