WPProbe — WP Authentication Probing Tool

Professional WordPress Security Testing Tool

Powerful Go application for comprehensive WordPress security analysis. Combines three key modules in one solution: WordPress discovery, credential validation, and password brute-forcing with proxy support and multi-threading.

Perfect for: penetration testers, information security specialists, web application auditors, and WordPress administrators.

Why Choose Our Tool

  • High Speed — multi-threaded processing of thousands of checks per minute
  • 🌍 IDN Support — full support for internationalized domain names
  • 🔒 Complete Anonymity — built-in HTTP and SOCKS proxy support
  • 🎯 Maximum Accuracy — intelligent WordPress entry point detection system
  • 🔄 Flexible Configuration — customizable data formats and password templates
  • 📊 Detailed Analytics — real-time statistics and monitoring

Three Powerful Modules in One Tool

🔍 1. Search — WordPress Discovery

Automatic WordPress site and user detection

The search module scans domain lists and automatically identifies WordPress sites, finds users, and detects entry points.

Key Features:

  • ✅ Bulk domain scanning (including IDN domains)
  • ✅ Flexible URL macros for path configuration
  • ✅ Automatic user discovery via: XML Sitemap, REST API, Author pages
  • ✅ Entry point detection: wp-login.php, xmlrpc.php
  • ✅ Redirect handling with final URL determination

✅ 2. Checker — Credential Validation

Fast WordPress login and password verification

The checker module validates credentials via XMLRPC or standard form authentication with detailed statistics.

Key Features:

  • ✅ Two authentication methods: XMLRPC, Standard form
  • ✅ Bulk checking with thread configuration
  • ✅ Recheck functionality
  • ✅ Flexible input data formats (URL:login:password)
  • ✅ Automatic CAPTCHA detection
  • ✅ Detailed statistics: successful, failed, error

3. Brute — Intelligent Brute Force

Smart password generation with macros

The brute force module uses a unique macro system to generate passwords based on login and site domain.

Macro System:

MacroDescriptionExample Result
[login]Login in lowercaseadmin
[Login]Capitalized first letterAdmin
[LOGIN]Fully uppercaseADMIN
[lOgIn]Alternating caseaDmIn
[host]Domain without TLDgoogle
[Host]Domain capitalizedGoogle
[HOST]Domain uppercaseGOOGLE

Combination Examples:

  • [login]123admin123
  • [Login]@2024Admin@2024
  • [HOST][login]GOOGLEadmin
  • [host]_[Login]!google_Admin!

Capabilities:

  • ✅ Multi-threaded password brute-forcing
  • ✅ Custom templates and wordlists
  • ✅ Automatic login method detection (classic, subdomain, SSO)

Additional Features

🌐 Advanced Proxy Support

  • Protocol Support: HTTP, SOCKS5
  • Flexible Format: host:port:username:password
  • Proxy Sources: URL link to remote list, Local proxy file
  • Automatic Rotation for load distribution
  • Individual Settings for each task type

💻 Cross-Platform Compatibility

Windows

  • Support: Windows 10/11, Server 2016+
  • Required: Administrator privileges
  • Auto-install to system startup

Linux

  • Support: Ubuntu, Debian
  • Required: Root access
  • Single executable file with no dependencies

Technical Specifications

🔧 Architecture

  • Development Language: Go (guaranteed high performance)
  • Database: SQLite (embedded, zero-config)
  • API: REST API for convenient management
  • Multi-threading: Flexible thread count configuration

⚡ Performance

  • Process thousands of domains per minute
  • Parallel execution of multiple checks
  • Minimal system resource consumption
  • Real-time statistics and monitoring

Usage Examples

Scenario 1: WordPress Site Discovery

Task: Find all WordPress sites from a domain list and identify users

Input Data: domains.txt (domain list)
URL Macros: https://[host]/wp-login.php
Result: Discovered WordPress sites + user list

Scenario 2: Credential Validation

Task: Verify validity of login and password list

Data Format: https://site.com/wp-login.php:admin:password123
Result: Valid and invalid credentials in database

Scenario 3: Brute Force with Macros

Task: Crack password using smart templates

URL: https://example.com/wp-login.php
Login: admin
Templates: [login]123, [Login]@2024, [HOST][login]
Result: Successful password or detailed report

System Requirements

ComponentMinimumRecommended
Processor2 cores4+ cores
RAM512 MB2+ GB
Disk Space100 MB500 MB+
NetworkStable connectionHigh-speed
Access RightsAdministrator/RootAdministrator/Root

Supported OS: Windows 10/11, Server 2016+, Ubuntu, Debian

Program Terms of Use

Price: $300

Contact