Skip to content

Commit e793358

Browse files
committed
Added wp-sec and wpscan
1 parent 0c8dbe0 commit e793358

4 files changed

Lines changed: 86 additions & 5 deletions

File tree

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
#!/usr/bin/env bash
2+
#----------------------------------------------------------------------------
3+
# EngineScript - High-Performance WordPress LEMP Server
4+
#----------------------------------------------------------------------------
5+
# Website: https://EngineScript.com
6+
# GitHub: https://github.com/Enginescript/EngineScript
7+
# Company: VisiStruct / EngineScript
8+
# License: GPL v3.0
9+
# OS: Ubuntu 22.04 (jammy)
10+
#----------------------------------------------------------------------------
11+
12+
# EngineScript Variables
13+
source /usr/local/bin/enginescript/enginescript-variables.txt
14+
source /home/EngineScript/enginescript-install-options.txt
15+
16+
# Check current user's ID. If user is not 0 (root), exit.
17+
if [ "${EUID}" != 0 ];
18+
then
19+
echo "${BOLD}ALERT:${NORMAL}"
20+
echo "EngineScript should be executed as the root user."
21+
exit
22+
fi
23+
24+
#----------------------------------------------------------------------------
25+
# Start Main Script
26+
27+
cd /var/www/sites
28+
printf "Please select the site you want to scan for vulnerabilities:\n"
29+
select d in */; do test -n "$d" && break; echo ">>> Invalid Selection"; done
30+
cd "$d"html && echo "WP-Sec Vulnerability Scan"
31+
wp wp-sec check --allow-root --type=all --output=user --api=v3 --cached --token=${WPSCANAPI}
32+
33+
# Ask user to acknowledge that the scan has completed before moving on
34+
echo ""
35+
echo ""
36+
read -n 1 -s -r -p "Press any key to continue"
37+
echo ""
38+
echo ""
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
#!/usr/bin/env bash
2+
#----------------------------------------------------------------------------
3+
# EngineScript - High-Performance WordPress LEMP Server
4+
#----------------------------------------------------------------------------
5+
# Website: https://EngineScript.com
6+
# GitHub: https://github.com/Enginescript/EngineScript
7+
# Company: VisiStruct / EngineScript
8+
# License: GPL v3.0
9+
# OS: Ubuntu 22.04 (jammy)
10+
#----------------------------------------------------------------------------
11+
12+
# EngineScript Variables
13+
source /usr/local/bin/enginescript/enginescript-variables.txt
14+
source /home/EngineScript/enginescript-install-options.txt
15+
16+
# Check current user's ID. If user is not 0 (root), exit.
17+
if [ "${EUID}" != 0 ];
18+
then
19+
echo "${BOLD}ALERT:${NORMAL}"
20+
echo "EngineScript should be executed as the root user."
21+
exit
22+
fi
23+
24+
#----------------------------------------------------------------------------
25+
# Start Main Script
26+
27+
cd /var/www/sites
28+
printf "Please select the site you want to scan for vulnerabilities:\n"
29+
select d in */; do test -n "$d" && break; echo ">>> Invalid Selection"; done
30+
echo "WPScan"
31+
wpscan --url $d -e vp --api-token ${WPSCANAPI}
32+
33+
# Ask user to acknowledge that the scan has completed before moving on
34+
echo ""
35+
echo ""
36+
read -n 1 -s -r -p "Press any key to continue"
37+
echo ""
38+
echo ""

scripts/install/tools/wordpress/wpscan.sh

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,6 @@ echo "============================================================"
3333
echo ""
3434
echo "${BOLD}WPScan installed.${NORMAL}"
3535
echo ""
36-
echo "To run a scan of your site:"
37-
echo "wpscan --url https://yourdomain.com --enumerate"
38-
echo ""
3936
echo "============================================================="
4037
echo ""
4138
echo ""

scripts/menu/security-tools-menu.sh

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,18 +32,26 @@ while true
3232
echo ""
3333
echo ""
3434
PS3='Please enter your choice: '
35-
secoptions=("WP-CLI Vulnerability Scanner (site scanner)" "PHP Malware Finder (site scanner)" "Linux Malware Detect (server scanner)" "Clam Antivirus (server scanner)" "Exit Security Tools")
35+
secoptions=("WP-CLI Vulnerability Scanner (site scanner)" "PHP Malware Finder (site scanner)" "WP-Sec Vulnerability Scan (site scanner)" "WPScan Vulnerability Scan (site scanner)" "Linux Malware Detect (server scanner)" "Clam Antivirus (server scanner)" "Exit Security Tools")
3636
select secopt in "${secoptions[@]}"
3737
do
3838
case $secopt in
39-
"WP-CLI Vulnerability Scanner (site scanner)")
39+
"10up WP-CLI Vulnerability Scanner (site scanner)")
4040
/usr/local/bin/enginescript/scripts/functions/security/10up-vuln-scanner.sh
4141
break
4242
;;
4343
"PHP Malware Finder (site scanner)")
4444
/usr/local/bin/enginescript/scripts/functions/security/php-malware-finder.sh
4545
break
4646
;;
47+
"WP-Sec Vulnerability Scan (site scanner)")
48+
/usr/local/bin/enginescript/scripts/functions/security/wp-sec.sh
49+
break
50+
;;
51+
"WPScan Vulnerability Scan (site scanner)")
52+
/usr/local/bin/enginescript/scripts/functions/security/wpscan.sh
53+
break
54+
;;
4755
"Linux Malware Detect (server scanner)")
4856
/usr/local/bin/enginescript/scripts/functions/security/maldet.sh
4957
break

0 commit comments

Comments
 (0)