AI‑Powered & Modular WordPress Security Scanner
WP‑Audit is a fully modular, AI‑powered auditing tool designed to analyze WordPress installations, detect vulnerabilities, evaluate security posture, and generate detailed reports in HTML or Markdown.
Featuring TLS‑aware requests, proxy support, automatic CVE/exploit detection, module prioritization, and optional brute‑force testing (authorized), WP‑Audit adapts to any engagement.
⚠️ Legal Notice
WP‑Audit is an offensive security tool intended only for authorized penetration testing, auditing, and research.
You must have explicit permission from the owner of any target you scan or brute‑force.
The author and contributors are not responsible for misuse or damages.
- 🤖 AI‑Powered Audit Reports
- 📄 HTML & Markdown report building
- 🧱 Completely modular (priority‑based)
- 🔍 Automatic CVE & Exploit detection
- 🔒 Full TLS Requests
- 🌐 Proxy support
- 🚀 Aggressive mode scanning
- 🔐 Password bruting (authorized use only)
- 🧩 Easy module creation
git clone https://github.com/Web3-Serializer/WP-Audit
cd WP-Audit
pip install -r requirements.txtWP‑Audit uses an AI model to enhance Markdown reports.
cp .env.exampleDownload from: https://ollama.com/download
Default model:
ollama pull qwen2.5:7bMODEL_NAME=qwen2.5:7b
main.py [-h] [--user-agent USER_AGENT] [--browser BROWSER] [--modules MODULES] [--list-modules]
[--threads THREADS] [--aggressive] [--brute {admin,enum}] [--check-vulns]
[--report {html,markdown}] [--proxy PROXY]
target_url
Run a full scan on https://example.com with multiple modules, 10 threads, aggressive scanning, vulnerability checking, and HTML report generation:
python3 main.py --threads 10 --aggressive --check-vulns --report html https://example.comWP‑Audit includes modules for:
- Admin endpoint detection
- Backup file detection
- Brute force (authorized only)
- Fuzzer
- Exposed .git / .svn detection
- Directory listing
- Plugin enumeration
- Theme enumeration
- User enumeration
- Version detection
- Vulnerability detection (CVE, exploits)
The WP Vulnerabilities module fetches known security issues:
- WordPress core
- Installed plugins
- Installed themes
Includes:
- CVE ID
- Description
- Severity
- Fixed versions
- Exploit‑DB references
- Known exploit indicators
WP‑Audit’s modular design makes adding features simple.
modules/
wp_example.py
from modules import ModuleBase
from main import WP_Audit
from libs.logger import Logger
class Module(ModuleBase):
def __init__(self, wp_audit_instance: WP_Audit):
super().__init__(wp_audit_instance)
self.name = "Example Module"
self.description = "This is an exemple module."
self.version = "1.0"
self.author = "Your Name Here"
self.enabled = True
self.logger = Logger(moduleName=self.name)
def run(self):
if not self.enabled:
return
self.logger.info(f"Running {self.name} on {self.target_url}")
# Simulated data extracted by the module
example_data = {
"module_name": self.name,
"target": self.target_url,
"message": "This is an example of gathered data.",
"status": "OK"
}
# Add it cleanly into the global audit data dictionary
self.wp_audit.gathered_informations.setdefault("example_data", [])
self.wp_audit.gathered_informations["example_data"].append(example_data)
self.logger.success("Example data added to gathered_informations!")If you enjoy WP‑Audit, please star the repository 😊