Skip to content

π™²πšˆπ™±π™΄πšπ™Ώπš„π™»πš‚π™΄ | πš†πš˜πš›πšπ™Ώπš›πšŽπšœπšœ πš‚πšŽπšŒπšžπš›πš’πšπš’ πšƒπšŽπšœπšπš’πš—πš π™΅πš›πšŠπš–πšŽπš πš˜πš›πš”

License

Notifications You must be signed in to change notification settings

Scav-engeR/CyberPulse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

CyberPulse

π™²πšˆπ™±π™΄πšπ™Ώπš„π™»πš‚π™΄ | πš‚πšŽπšŒπšžπš›πš’πšπš’ πšƒπšŽπšœπšπš’πš—πš π™΅πš›πšŠπš–πšŽπš πš˜πš›πš”

  _____      _               _____      _            
 / ____|    | |             |  __ \    | |           
| |    _   _| |__   ___ _ __| |__) |   | |___  ___   
| |   | | | | '_ \ / _ \ '__|  ___/ | | / __|/ _ \  
| |___| |_| | |_) |  __/ |  | |   | |_| \__ \  __/  
 \_____\__, |_.__/ \___|_|  |_|    \__,_|___/\___|  
        __/ |                                        
       |___/      [WordPress Security Framework v2.0]

Version Python License

:: ADVANCED WORDPRESS SECURITY SCANNING & TESTING FRAMEWORK ::
A CYBERPUNK-THEMED TOOLKIT FOR AUTHORIZED SECURITY TESTING

⟨⟨ SYSTEM OVERVIEW ⟩⟩

CyberPulse is a comprehensive WordPress security testing framework designed for authorized security professionals and penetration testers. With an interactive console interface, rich progress visualization, and advanced scanning capabilities, CyberPulse offers a powerful toolkit for identifying and analyzing vulnerabilities in WordPress installations.

Warning

This framework is for EDUCATIONAL AND AUTHORIZED TESTING PURPOSES ONLY. Unauthorized use against systems without explicit permission is illegal and unethical. Always obtain proper authorization before conducting security tests.


⟨⟨ INSTALLATION ⟩⟩

[01] AUTOMATIC INSTALLATION

Simply run the script and it will automatically detect your operating system and install all required dependencies:

python3 cyberpulse.py

[02] MANUAL INSTALLATION

If you prefer to install dependencies manually:

Debian/Ubuntu:

apt-get update
apt-get install -y python3-pip python3-requests python3-colorama
pip3 install requests colorama tqdm rich tabulate validators pyfiglet configparser

CentOS/RHEL/Alma:

yum update -y
yum install -y python3-pip
pip3 install requests colorama tqdm rich tabulate validators pyfiglet configparser

⟨⟨ QUICKSTART ⟩⟩

[01] BASIC USAGE

# Start the interactive interface
python3 cyberpulse.py

# Scan targets from a file
python3 cyberpulse.py -t targets.txt --scan

# Advanced options
python3 cyberpulse.py -t targets.txt --threads 20 --timeout 30 --verbose

[02] COMMAND LINE OPTIONS

Option Description
-t, --targets Path to file containing target URLs
-o, --output Custom output directory for results
-v, --verbose Enable verbose output
--threads Number of concurrent threads (default: 10)
--timeout Request timeout in seconds (default: 15)
--scan Start scanning immediately after loading targets

⟨⟨ FEATURES ⟩⟩

[01] CORE CAPABILITIES

  • πŸ” WordPress Detection: Identify WordPress installations with high accuracy
  • 🧩 Plugin Enumeration: Discover installed plugins and their versions
  • 🚨 Vulnerability Scanning: Detect vulnerable Elementor versions (3.5.x and 3.6.0-3.6.2)
  • πŸ” User Registration: Test for enabled user registration vulnerabilities
  • πŸ’‰ Exploitation Framework: Test for and validate security vulnerabilities
  • πŸ“Š Comprehensive Reporting: Detailed results in multiple export formats

[02] UI ENHANCEMENTS

  • πŸ–₯️ Interactive Console: User-friendly menu-driven interface
  • πŸ“ˆ Progress Visualization: Real-time scanning progress with rich display
  • 🎨 Cyberpunk Theming: Stylish visual elements and color schemes
  • πŸ“‹ Structured Output: Well-organized, easy-to-read results

[03] TECHNICAL FEATURES

  • 🧡 Multi-threading: Concurrent scanning for improved performance
  • πŸ”„ User-Agent Rotation: Avoid detection with rotating user-agents
  • 🧰 OS Detection: Cross-platform compatibility with automatic adaptation
  • βš™οΈ Configuration Management: Customizable settings via config file or CLI

⟨⟨ INTERACTIVE MENU ⟩⟩

CyberPulse features a fully interactive menu system:

  1. Load targets from file - Import URLs from a text file
  2. Scan targets for WordPress - Detect WordPress installations
  3. Check for vulnerable Elementor versions - Identify security vulnerabilities
  4. Advanced WordPress enumeration - Detailed site analysis
  5. Exploit vulnerable sites - Test and validate vulnerabilities
  6. Configuration - Customize tool settings
  7. View results - Examine and export findings

⟨⟨ DETAILED TOOLS ⟩⟩

[01] WORDPRESS SCANNER

The WordPress Scanner module identifies WordPress installations by checking for common files, directories, and signature patterns. It employs multiple detection methods to ensure accuracy even on heavily customized sites.

[02] ELEMENTOR VULNERABILITY SCANNER

This specialized module detects versions of the Elementor page builder plugin vulnerable to security issues (versions 3.5.x and 3.6.0-3.6.2). It analyzes the plugin's readme.txt file to precisely identify version information.

[03] PLUGIN ENUMERATOR

The Plugin Enumerator discovers installed WordPress plugins using multiple techniques, including directory analysis and HTML source inspection. This provides valuable insights into the site's potential attack surface.

[04] EXPLOITATION FRAMEWORK

For authorized testing, this module can validate vulnerabilities by attempting to register users and exploit security weaknesses. All actions are logged for comprehensive reporting.


⟨⟨ ETHICAL GUIDELINES ⟩⟩

When using CyberPulse, always adhere to these ethical principles:

  1. Obtain Explicit Authorization - Never test systems without written permission
  2. Respect Scope Limitations - Stay within authorized boundaries
  3. Minimize Impact - Avoid actions that could disrupt normal operations
  4. Secure Testing Data - Protect all information gathered during testing
  5. Responsible Disclosure - Report findings to the system owner securely
  6. Follow Local Laws - Comply with all applicable regulations

⟨⟨ DISCLAIMER ⟩⟩

This tool is provided for educational and authorized security testing purposes only. The creators and contributors assume no liability for misuse or damage caused by improper use of this software. Users are solely responsible for ensuring they have proper authorization before conducting any security tests.


⟨⟨ LICENSE ⟩⟩

MIT License

Copyright (c) 2025 CyberPulse Contributors

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.


[END OF TRANSMISSION]

About

π™²πšˆπ™±π™΄πšπ™Ώπš„π™»πš‚π™΄ | πš†πš˜πš›πšπ™Ώπš›πšŽπšœπšœ πš‚πšŽπšŒπšžπš›πš’πšπš’ πšƒπšŽπšœπšπš’πš—πš π™΅πš›πšŠπš–πšŽπš πš˜πš›πš”

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages