From fe05534a95c28a8d07bf177d309ba72d549eee30 Mon Sep 17 00:00:00 2001 From: ethicalhack3r Date: Sat, 27 Sep 2014 16:55:11 +0200 Subject: [PATCH] Update wpstools docs #697 --- README | 16 ++++------------ README.md | 9 --------- 2 files changed, 4 insertions(+), 21 deletions(-) diff --git a/README b/README index 686d265c..af02382a 100644 --- a/README +++ b/README @@ -250,21 +250,13 @@ Debug output... ==WPSTOOLS ARGUMENTS== -v, --verbose Verbose output - --check-vuln-ref-urls, --cvru Check all the vulnerabilities reference urls for 404 - --check-local-vulnerable-files, --clvf LOCAL_DIRECTORY Perform a recursive scan in the LOCAL_DIRECTORY to find vulnerable files or shells - --generate-plugin-list, --gpl [NUMBER_OF_ITEMS] Generate a new data/plugins.txt file. (supply number of *items* to parse, default : 1500) - --generate-full-plugin-list, --gfpl Generate a new full data/plugins.txt file - --generate-theme-list, --gtl [NUMBER_OF_ITEMS] Generate a new data/themes.txt file. (supply number of *items* to parse, default : 200) - --generate-full-theme-list, --gftl Generate a new full data/themes.txt file - --generate-all, --ga Generate a new full plugins, full themes, popular plugins and popular themes list --s, --stats Show WpScan Database statistics - --spellcheck, --sc Check all files for common spelling mistakes. +--check-vuln-ref-urls, --cvru Check all the vulnerabilities reference urls for 404 +--check-local-vulnerable-files, --clvf LOCAL_DIRECTORY Perform a recursive scan in the LOCAL_DIRECTORY to find vulnerable files or shells +s, --stats Show WpScan Database statistics. +--spellcheck, --sc Check all files for common spelling mistakes. ==WPSTOOLS EXAMPLES== -- Generate a new 'most popular' plugin list, up to 1500 items ... -ruby wpstools.rb --generate-plugin-list 1500 - Locally scan a wordpress installation for vulnerable files or shells: ruby wpstools.rb --check-local-vulnerable-files /var/www/wordpress/ diff --git a/README.md b/README.md index daf21880..0b2b6447 100644 --- a/README.md +++ b/README.md @@ -252,21 +252,12 @@ Debug output... -v, --verbose Verbose output --check-vuln-ref-urls, --cvru Check all the vulnerabilities reference urls for 404 --check-local-vulnerable-files, --clvf LOCAL_DIRECTORY Perform a recursive scan in the LOCAL_DIRECTORY to find vulnerable files or shells - --generate-plugin-list, --gpl [NUMBER_OF_ITEMS] Generate a new data/plugins.txt file. (supply number of *items* to parse, default : 1500) - --generate-full-plugin-list, --gfpl Generate a new full data/plugins.txt file - --generate-theme-list, --gtl [NUMBER_OF_ITEMS] Generate a new data/themes.txt file. (supply number of *items* to parse, default : 200) - --generate-full-theme-list, --gftl Generate a new full data/themes.txt file - --generate-all, --ga Generate a new full plugins, full themes, popular plugins and popular themes list -s, --stats Show WpScan Database statistics. --spellcheck, --sc Check all files for common spelling mistakes. #### WPSTOOLS EXAMPLES -Generate a new 'most popular' plugin list, up to 1500 items... - -```ruby wpstools.rb --generate-plugin-list 1500``` - Locally scan a wordpress installation for vulnerable files or shells: ```ruby wpstools.rb --check-local-vulnerable-files /var/www/wordpress/```