Skip to content
forked from roxas-tan/CMSmap

CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.

License

Notifications You must be signed in to change notification settings

makikvues/CMSmap

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CMSmap

CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of CMSmap is to integrate common vulnerabilities for different types of CMSs in a single tool.

At the moment, CMSs supported by CMSmap are WordPress, Joomla, Drupal and Moodle.

Please note that this project is an early state. As such, you might find bugs, flaws or mulfunctions. Use it at your own risk!

Preview

Installation

You can download the latest version of CMSmap by cloning the GitHub repository:

 git clone https://github.com/makikvues/CMSmap

Then you need to configure the edbtype and edbpath settings in the cmsmap.conf. Use GIT if you have a local Git repository of Exploit-db :

[exploitdb]
edbtype = GIT
edbpath = /opt/exploitdb/

Alternatively, use APT if you have installed the debian exploitdb package. For Kali, use the following settings :

[exploitdb]
edbtype = APT
edbpath = /usr/share/exploitdb/

If you would like to run cmsmap from anywhere in your system you can install it with pip3 :

cd CMSmap
pip3 install .

To uninstall it :

pip3 uninstall cmsmap -y

Usage

usage: cmsmap [-f W/J/D] [-F] [-t] [-a] [-H] [-i] [-o] [-E] [-d] [-u] [-p]
              [-x] [-k] [-w] [-v] [-h] [-D] [-U W/J/D]
              [target]

CMSmap tool v1.0 - Simple CMS Scanner
Author: Mike Manzotti

Scan:
  target                    target URL (e.g. 'https://example.com:8080/')
  -f W/J/D, --force W/J/D   force scan (W)ordpress, (J)oomla or (D)rupal
  -F, --fullscan            full scan using large plugin lists. False positives and slow!
  -t , --threads            number of threads (Default 5)
  -a , --agent              set custom user-agent
  -H , --header             add custom header (e.g. 'Authorization: Basic ABCD...')
  -i , --input              scan multiple targets listed in a given file
  -o , --output             save output in a file
  -E, --noedb               enumerate plugins without searching exploits
  -c, --nocleanurls         disable clean urls for Drupal only
  -s, --nosslcheck          don't validate the server's certificate
  -d, --dictattack          run low intense dictionary attack during scanning (5 attempts per user)

Brute-Force:
  -u , --usr                username or username file
  -p , --psw                password or password file
  -x, --noxmlrpc            brute forcing WordPress without XML-RPC

Post Exploitation:
  -k , --crack              password hashes file (Require hashcat installed. For WordPress and Joomla only)
  -w , --wordlist           wordlist file

Others:
  -v, --verbose                       verbose mode (Default false)
  -h, --help                          show this help message and exit
  -D, --default                       rum CMSmap with default options
  -U, --update                        use (C)MSmap, (P)lugins or (PC) for both
  -e, --enumDefaultFiles              enumerate default files
  -X  --dontCloneExploitDb            don't clone exploit DB
  -P  --exploitDbPath                 exploit DB path
  -A  --updateExploitDbAndPlugins     update exploit DB and plugins

Examples:
  cmsmap.py https://example.com
  cmsmap.py https://example.com -f W -F --noedb -d
  cmsmap.py https://example.com -i targets.txt -o output.txt
  cmsmap.py https://example.com -u admin -p passwords.txt
  cmsmap.py -k hashes.txt -w passwords.txt

Contribution guidelines

If you want to contribute to CMSmap, be sure to review the contribution guidelines.

Disclaimer

Usage of CMSmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.

About

CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%