Examples (8)
Update the vulnerability database
wpscan --updateScan a WordPress website
wpscan --url urlScan a WordPress website, using random user agents and passive detection
wpscan --url url --stealthyScan a WordPress website, checking for vulnerable plugins and specifying the path to the `wp-content` directory
wpscan --url url --enumerate vp --wp-content-dir remote/path/to/wp-contentScan a WordPress website through a proxy
wpscan --url url --proxy protocol://ip:port --proxy-auth username:passwordPerform user identifiers enumeration on a WordPress website
wpscan --url url --enumerate uExecute a password guessing attack on a WordPress website
wpscan --url url --usernames username|path/to/usernames.txt --passwords path/to/passwords.txt threads 20Scan a WordPress website, collecting vulnerability data from the WPVulnDB (<https://wpvulndb.com/>)
wpscan --url url --api-token tokenmade by @shridhargupta | data from tldr-pages