DrXploit is an open-source web application security assessment toolkit. It automates the detection and verification of known vulnerabilities across popular CMS platforms, helping security researchers save time during authorized testing.
Use this tool only on systems you own or have explicit permission to test.
- Multi-CMS coverage: WordPress, Joomla, Drupal, PrestaShop, and more.
- Curated exploit checks: A broad collection of known issues for multiple CMS ecosystems.
- Parallel execution: ThreadPoolExecutor-based scanning of multiple targets.
- Simple CLI: Clean, easy-to-use command-line interface.
- Rich output: Nicely formatted console output via Rich.
- SITE: 158+ exploits
- Python 3.x
- Python packages: rich, argparse, bs4, requests, colorama
git clone https://github.com/DrDataYE/DrXploit.git
cd DrXploit
bash setup.shNote: The setup script installs dependencies and configures a launcher.
From the project directory:
bash uninstall.shFor system-wide installs (e.g., if setup was run with sudo):
sudo bash uninstall.shThe script removes installed files, the virtual environment, the launcher, and related PATH entries.
drxploit -ldrxploit path_to_file_or_domaindrxploit -e "your_email@example.com"Scan domains from a file:
drxploit sites.txtScan a single domain:
drxploit example.com- -h, --help: Show help.
- -l, --list-files: List files in the result directory.
- -c, --list-cms: List files in the cms directory.
- -e, --email: Set an email address for important data.
All logs and findings are saved to the result directory in the project. Review this folder after scans to inspect results.
DrXploit supports multiple CMS platforms, including:
- WordPress: Plugin and theme issues.
- Joomla: Component and module vulnerabilities.
- Drupal: Core and module checks.
- PrestaShop: Module and theme vulnerabilities.
- Other CMS: Custom and lesser-known platforms.
Contributions are welcome. Open an issue to report bugs or request features, or submit a pull request.
Note: We do not condone unethical use of this tool.
This project is licensed under the MIT License. See the LICENSE file for details.
