A script that can determine whether a website is vulnerable to xmlrpc DOS.
Â
./xmlrpc-dos.sh \<url\>
Value | Description |
---|---|
url | Target url (e.g. 'https://dummy.com' or 'http://dummy.com') |
This script required dependencies of
curl >= 7.88.1
or higher.
The use of the xmlrpc-dos is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.
â—‰ WP XML-RPC DoS https://gist.github.com/ethicalhack3r/60a3ea6d7c86c7ace891
â—‰ Adelittle repo https://github.com/Adelittle/wpdos
â—‰ Adelittle blog https://www.nakanosec.com/2022/03/riset-xmlrpc-ddos-attack-bypass-waf.html