From 09c11621e9d3f4009cb44c19cc14f9cbdc7280e4 Mon Sep 17 00:00:00 2001 From: Swissky Date: Sun, 29 Jul 2018 19:29:18 +0200 Subject: [PATCH] README - Fix typo in demo code --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 996c3dd..e488f78 100644 --- a/README.md +++ b/README.md @@ -25,7 +25,7 @@ pip install -r requirements.txt ## Examples ### Example 1 : Basic update and scan of a wordpress -```python +```powershell python main.py -u "http://localhost/wordpress" --update --random-agent -u : Url of the WordPress @@ -36,11 +36,11 @@ python main.py -u "http://localhost/wordpress" --update --random-agent ### Example 2 : Basic bruteforce (option --brute, option --nocheck) * bruteforce customs usernames -```python +```powershell python main.py -u "http://127.0.0.1/wordpress/" --brute --usernames "admin,guest" --passwords-list fuzz/wordlist.lst ``` * bruteforce with usernames list -```python +```powershell python main.py -u "http://127.0.0.1/wordpress/" --brute --users-list fuzz/wordlist.lst --passwords-list fuzz/wordlist.lst ``` * bruteforce detected users @@ -49,7 +49,7 @@ python main.py -u "http://127.0.0.1/wordpress/" --brute --passwords-list fuzz/wo ``` -```python +```powershell ╭─ πŸ‘» swissky@crashlab: ~/Github/Wordpresscan β€Ήmaster*β€Ί ╰─$ python main.py -u "http://127.0.0.1/wordpress/" --brute --users-list fuzz/wordlist.lst --passwords-list fuzz/wordlist.lst --nocheck _______________________________________________________________ @@ -76,7 +76,7 @@ Bruteforcing - β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“β–“ ``` ### Example 3 : Thinking is overrated, this is aggressive, mostly not advised! -```python +```powershell python main.py -u "http://127.0.0.1/wordpress/" --fuzz [i] Enumerating components from aggressive fuzzing ...