./go/bin/gobuster dir -u http://example.com -w /usr/share/wordlists/dirb/common.txt -t 40 -e
gobuster dir -u http://example.com -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,txt,html,sql -t 40 -e
~/go/bin/gobuster dir -u http://192.168.56.101:12380 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,sql,html,txt -t 40 -e -p http://127.0.0.1:8080
LFI Scan & Exploit Tool (@hc0d3r - P0cL4bs Team)
kadimus -u http://192.168.56.103/?page=login --proxy http://127.0.0.1:8080 --output outputfile
kadimus -u http://192.168.56.103/?page=login --parameter page --get-source --filename "login" --proxy http://127.0.0.1:8080
nikto -h [hostname/ip]
nikto -h [hostname/ip] -output [filename]
LW_SSL_ENGINE=SSLeay
nikto -h [hostname/ip] -useproxy http://localhost:8080/
get all vuln plugins/themes, get Timthumbs, config backups, Medias and users
wpscan --url https://192.168.56.101:12380/blogblog/ --disable-tls-checks --enumerate vp,vt,tt,cb,dbe,u,m
wpscan --url https://192.168.56.101:12380/blogblog/ --disable-tls-checks --enumerate vp,vt,tt,cb,dbe,u,m --api-token TOKEN
wpscan --url https://192.168.56.101:12380/blogblog/ --disable-tls-checks --enumerate ap,at,tt,cb,dbe,u,m --detection-mode aggressive --plugins-detection aggressive --plugins-version-detection aggressive --api-token TOKEN