π²ππ±π΄ππΏππ»ππ΄ | ππππππππ’ πππππππ π΅πππππ πππ
_____ _ _____ _
/ ____| | | | __ \ | |
| | _ _| |__ ___ _ __| |__) | | |___ ___
| | | | | | '_ \ / _ \ '__| ___/ | | / __|/ _ \
| |___| |_| | |_) | __/ | | | | |_| \__ \ __/
\_____\__, |_.__/ \___|_| |_| \__,_|___/\___|
__/ |
|___/ [WordPress Security Framework v2.0]
A CYBERPUNK-THEMED TOOLKIT FOR AUTHORIZED SECURITY TESTING
CyberPulse is a comprehensive WordPress security testing framework designed for authorized security professionals and penetration testers. With an interactive console interface, rich progress visualization, and advanced scanning capabilities, CyberPulse offers a powerful toolkit for identifying and analyzing vulnerabilities in WordPress installations.
Warning
This framework is for EDUCATIONAL AND AUTHORIZED TESTING PURPOSES ONLY. Unauthorized use against systems without explicit permission is illegal and unethical. Always obtain proper authorization before conducting security tests.
Simply run the script and it will automatically detect your operating system and install all required dependencies:
python3 cyberpulse.py
If you prefer to install dependencies manually:
apt-get update
apt-get install -y python3-pip python3-requests python3-colorama
pip3 install requests colorama tqdm rich tabulate validators pyfiglet configparser
yum update -y
yum install -y python3-pip
pip3 install requests colorama tqdm rich tabulate validators pyfiglet configparser
# Start the interactive interface
python3 cyberpulse.py
# Scan targets from a file
python3 cyberpulse.py -t targets.txt --scan
# Advanced options
python3 cyberpulse.py -t targets.txt --threads 20 --timeout 30 --verbose
Option | Description |
---|---|
-t, --targets |
Path to file containing target URLs |
-o, --output |
Custom output directory for results |
-v, --verbose |
Enable verbose output |
--threads |
Number of concurrent threads (default: 10) |
--timeout |
Request timeout in seconds (default: 15) |
--scan |
Start scanning immediately after loading targets |
- π WordPress Detection: Identify WordPress installations with high accuracy
- π§© Plugin Enumeration: Discover installed plugins and their versions
- π¨ Vulnerability Scanning: Detect vulnerable Elementor versions (3.5.x and 3.6.0-3.6.2)
- π User Registration: Test for enabled user registration vulnerabilities
- π Exploitation Framework: Test for and validate security vulnerabilities
- π Comprehensive Reporting: Detailed results in multiple export formats
- π₯οΈ Interactive Console: User-friendly menu-driven interface
- π Progress Visualization: Real-time scanning progress with rich display
- π¨ Cyberpunk Theming: Stylish visual elements and color schemes
- π Structured Output: Well-organized, easy-to-read results
- π§΅ Multi-threading: Concurrent scanning for improved performance
- π User-Agent Rotation: Avoid detection with rotating user-agents
- π§° OS Detection: Cross-platform compatibility with automatic adaptation
- βοΈ Configuration Management: Customizable settings via config file or CLI
CyberPulse features a fully interactive menu system:
- Load targets from file - Import URLs from a text file
- Scan targets for WordPress - Detect WordPress installations
- Check for vulnerable Elementor versions - Identify security vulnerabilities
- Advanced WordPress enumeration - Detailed site analysis
- Exploit vulnerable sites - Test and validate vulnerabilities
- Configuration - Customize tool settings
- View results - Examine and export findings
The WordPress Scanner module identifies WordPress installations by checking for common files, directories, and signature patterns. It employs multiple detection methods to ensure accuracy even on heavily customized sites.
This specialized module detects versions of the Elementor page builder plugin vulnerable to security issues (versions 3.5.x and 3.6.0-3.6.2). It analyzes the plugin's readme.txt file to precisely identify version information.
The Plugin Enumerator discovers installed WordPress plugins using multiple techniques, including directory analysis and HTML source inspection. This provides valuable insights into the site's potential attack surface.
For authorized testing, this module can validate vulnerabilities by attempting to register users and exploit security weaknesses. All actions are logged for comprehensive reporting.
When using CyberPulse, always adhere to these ethical principles:
- Obtain Explicit Authorization - Never test systems without written permission
- Respect Scope Limitations - Stay within authorized boundaries
- Minimize Impact - Avoid actions that could disrupt normal operations
- Secure Testing Data - Protect all information gathered during testing
- Responsible Disclosure - Report findings to the system owner securely
- Follow Local Laws - Comply with all applicable regulations
This tool is provided for educational and authorized security testing purposes only. The creators and contributors assume no liability for misuse or damage caused by improper use of this software. Users are solely responsible for ensuring they have proper authorization before conducting any security tests.
MIT License
Copyright (c) 2025 CyberPulse Contributors
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
[END OF TRANSMISSION]