Full Code of HA71/WhatCMS for AI

master 902da7db5d25 cached
2 files
25.3 KB
9.6k tokens
1 requests
Download .txt
Repository: HA71/WhatCMS
Branch: master
Commit: 902da7db5d25
Files: 2
Total size: 25.3 KB

Directory structure:
gitextract_eho15s6l/

├── README.md
└── whatcms.sh

================================================
FILE CONTENTS
================================================

================================================
FILE: README.md
================================================
# WhatCMS.sh
CMS Detection and Exploit Kit based on **[Whatcms.org](https://whatcms.org)** API.

## Introduction
Whatcms.sh can currently detect the use of more than **330 different CMS** applications and services to later indicate a list of valid security audit tools for the detected CMS.

You need the whatcms.org API to use the tool:
+ [Get API key](https://whatcms.org/Subscriptions)

## Use

``Usage: ``*``./whatcms.sh example.com``*
```
-h          Display help message
-wh         Check hosting details
--tools     Display tools information
```

![alt](https://media.giphy.com/media/2xPMQtvkDOLg49dgGt/giphy.gif)

## Information

### Detected CMSs

[CMS list](https://whatcms.org/Content-Management-Systems)

### Included tools

TOOLS | UTILITY | REPO URL
--- | --- | ---
Dumb0 | Username Scrapper Tool | https://github.com/0verl0ad/Dumb0/ 
CMSsc4n | Identify Tool | https://github.com/n4xh4ck5/CMSsc4n 
Puppet | Identify Tool | https://github.com/Poil/puppet-websites-facts 
pyfiscan | Identify Tool | https://github.com/fgeek/pyfiscan 
XAttacker | Exploit Tool |  https://github.com/Moham3dRiahi/XAttacker
beecms | Exploit Tool | https://github.com/CHYbeta/cmsPoc 
CMSXPL | Exploit Tool | https://github.com/tanprathan/CMS-XPL 
JMassExploiter | Exploit Tool | https://github.com/anarcoder/JoomlaMassExploiter 
WPMassExploiter | Exploit Tool | https://github.com/anarcoder/WordPressMassExploiter 
CMSExpFram | Exploit Tool | https://github.com/Q2h1Cg/CMS-Exploit-Framework 
LotusXploit | Exploit Tool | https://github.com/Hood3dRob1n/LotusCMS-Exploit 
BadMod | Exploit Tool | https://github.com/MrSqar-Ye/BadMod 
M0B | Exploit Tool | https://github.com/mobrine-mob/M0B-tool 
LetMeFuckIt | Exploit Tool | https://github.com/onthefrontline/LetMeFuckIt-Scanner 
magescan | Exploit Tool | https://github.com/steverobbins/magescan 
PRESTA | Exploit Tool | https://github.com/AlisamTechnology/PRESTA-modules-shell-exploit 
EktronE | Exploit Tool | https://github.com/tomkallo/Ektron_CMS_8.02_exploit 
XBruteForcer | Brute Force Tool | https://github.com/Moham3dRiahi/XBruteForcer 
CoMisSion | Analyze Tool | https://github.com/Intrinsec/comission 
droopescan | Analyze Tool | https://github.com/droope/droopescan 
CMSmap | Analyze Tool | https://github.com/Dionach/CMSmap 
JoomScan | Analyze Tool | https://github.com/rezasp/joomscan 
VBScan | Analyze Tool | https://github.com/rezasp/vbscan 
JoomlaScan | Analyze Tool | https://github.com/drego85/JoomlaScan 
c5scan | Analyze Tool | https://github.com/auraltension/c5scan 
T3scan | Analyze Tool | https://github.com/Oblady/T3Scan 
moodlescan | Analyze Tool | https://github.com/inc0d3/moodlescan 
SPIPScan | Analyze Tool | https://github.com/PaulSec/SPIPScan 
WPHunter | Analyze Tool | https://github.com/aryanrtm/WP-Hunter 
WPSeku | Analyze Tool | https://github.com/m4ll0k/WPSeku 
ACDrupal | Analyze Tool | https://github.com/mrmtwoj/ac-drupal 
Plown | Analyze Tool | https://github.com/unweb/plown 
conscan | Analyze Tool | https://github.com/nullsecuritynet/tools/tree/master/scanner/conscan 
CMSScanner | Analyze Tool | https://github.com/CMS-Garden/cmsscanner 
cmsExplorer | Analyze Tool | https://code.google.com/archive/p/cms-explorer
WPScan | Analyze Tool | https://github.com/wpscanteam/wpscan 
MooScan | Analyze Tool | https://github.com/vortexau/mooscan 
Scanners | Analyze Tool | https://github.com/b3o1/Scanners 
LiferayScan | Analyze Tool | https://github.com/bcoles/LiferayScan 
InfoLeak | Analyze Tool | https://github.com/SIWECOS/InfoLeak-Scanner 
joomlavs | Analyze Tool | https://github.com/rastating/joomlavs 
WAScan | Analyze Tool | https://github.com/m4ll0k/WAScan 
RedHawk | Analyze Tool | https://github.com/Tuhinshubhra/RED_HAWK 
HostileSBF | Analyze Tool | https://github.com/nahamsec/HostileSubBruteforcer 


================================================
FILE: whatcms.sh
================================================
#!/bin/bash

#SET YOUR WHATCMS API KEY HERE
cmsapikey=

#Banner function
banner()
{
	echo ""
	echo "-------------------------------------------------------------"	
	echo ""
	echo ""
	echo -e "\e[1;36m██╗    ██╗██╗  ██╗ █████╗ ████████╗ ██████╗███╗   ███╗███████╗"
	echo -e "██║    ██║██║  ██║██╔══██╗╚══██╔══╝██╔════╝████╗ ████║██╔════╝"
	echo -e "██║ █╗ ██║███████║███████║   ██║   ██║     ██╔████╔██║███████╗"
	echo -e "██║███╗██║██╔══██║██╔══██║   ██║   ██║     ██║╚██╔╝██║╚════██║"
	echo -e "╚███╔███╔╝██║  ██║██║  ██║   ██║   ╚██████╗██║ ╚═╝ ██║███████║"
	echo -e " ╚══╝╚══╝ ╚═╝  ╚═╝╚═╝  ╚═╝   ╚═╝    ╚═════╝╚═╝     ╚═╝╚══════╝\e[0m"
    echo ""
    echo ""                                                          
	echo -e "   CMS Detection and Exploit Kit based on \e[1mWhatCMS.org\e[0m API"
	echo ""
	echo -e "\e[1m  --------------------\e[0m"
	echo -e "\e[1m |\e[0m \e[1;36mCMS database: 331\e[0m  \e[1m|\e[0m"
	echo -e "\e[1m |\e[0m \e[1;36mTools database: 44\e[0m \e[1m|\e[0m"
	echo -e "\e[1m  --------------------\e[0m"
	echo -e "                                           \e[2;3;36mdeveloped by HATI\e[0m"
	echo "-------------------------------------------------------------"
}

#APIKEYcheck
apikeycheck()
{
	if [[ -z $cmsapikey ]];then
		echo ""
		echo -e " \e[38;5;196;1m[#] API Key not found.\e[0m"
		echo -e " \e[1m[-] Set your WhatCMS API Key on the source code\e[0m"
		echo ""
		exit 0
	fi
}

#TrashDel
trashdel()
{
	echo " " > tmpver
	rm tmpver
	echo " " > tmptools2
	rm tmptools2
	echo " " > tmpgit
	rm tmpgit
	echo " " > tmptools
	rm tmptools
	echo " " > tmp
	rm tmp
	echo " " > cmstmp
	rm cmstmp
}

#DomainCheck function
domaincheck()
{
	if [[ -z $1 ]];then
		echo ""
	else
		verify=$(echo $1 | grep -c -P '^(?!:\/\/)(?=.{1,255}$)((.{1,63}\.){1,127}(?![0-9]*$)[a-z0-9-]+\.?.*)')
		if [ $verify != 0 ]; then
			echo ""
		fi
	fi
}

#WhatCMS function
whatcms()
{
    curl -s "https://whatcms.org/APIEndpoint?key=$cmsapikey&url="$1 > tmp
    api=$(cat tmp | sed -e 's/[{}]/''/g' | awk -v RS=',"' -F: '/^msg/ {print $2}' | sed 's/\(^"\|"$\)//g' | grep -c Invalid)
    if [[ $api == 1 ]];then
    	echo -e " \e[38;5;196;1m[#] Invalid API key.\e[0m"
    	echo -e " \e[1m[-] Set your WhatCMS API Key on the source code.\e[0m"
    	echo ""
    	exit 0
    else
    	cms=$(cat tmp | sed -e 's/[{}]/''/g' | awk -v RS=',"' -F: '/^name/ {print $2}' | sed 's/\(^"\|"$\)//g')
    	version=$(cat tmp | sed -e 's/[{}]/''/g' | awk -v RS=',"' -F: '/^version/ {print $2}' | sed 's/\(^"\|"$\)//g')
    	echo ""
    	echo -e " \e[1m[URL]: \e[1;36m$1\e[0m"
    	echo ""
    	echo -e " \e[1m[CMS]: \e[1;92m$cms\e[0m"
    	echo ""
    	echo -e " \e[1m[VERSION]: \e[1;92m$version\e[0m"
    fi
}

#WhoHOST function
whohost()
{
	curl -s "https://www.who-hosts-this.com/APIEndpoint?key=$cmsapikey&url="$1 > tmp
	api=$(cat tmp | sed -e 's/[{}]/''/g' | awk -v RS=',"' -F: '/^msg/ {print $2}' | sed 's/\(^"\|"$\)//g' | grep -c Invalid)
  	isp=$(cat tmp | sed -e 's/[{}]/''/g' | awk -v RS=',"' -F: '/^isp_name/ {print $2}' | sed 's/\(^"\|"$\)//g' | sort | uniq | tr '\n' ' ')
	ip=$(grep -o '[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}' tmp | sort | uniq | tr '\n' ' ')
	type=$(cat tmp | sed -e 's/[{}]/''/g' | awk -v RS=',"' -F: '/^type/ {print $2}' | sed 's/\(^"\|"$\)//g' | sort | uniq | tr '\n' ' ')
	echo ""
	echo -e " \e[1m[ISP]: \e[1;36m$isp\e[0m"
	echo ""
	echo -e " \e[1m[IP]: \e[1;36m$ip\e[0m"
	echo ""
	echo -e " \e[1m[TYPE] \e[1;36m$type\e[0m"
}

#CMSToolsask function
cmstoolsask()
{
	echo ""
	echo "-------------------------------------------------------------"
	echo  -e "DruPal\nJoomla\nSPIP\nWordpress\nDrupal\nXen\nBigTreeCMS\nDrupal\nWeBid\nDiscuz\nvbulletin\nHeroku\nOpenCart\nPHPBB\nBugzilla\nMambo\nWolf\nStartBBS\nMadeSimple\nVeyton\nMagento\nMagento\nshopify\nMagento\nPrestashop\nMoodle\nmyBB\nCentreon\nTYPO3CMS\nBetoffice\nWaiKu\nLokomedia\nOpenCart\nuseBB\nEZPublish\nClaroline\nFly-High\nAllCMS\nxt-commerce\nvanilla\nTypo3\nPlone\nsquarespace\nClipperCMS\nPrestashop\nHavalite\nWebspell\ntumblr\nbbPress\nPhpMyAdmin\nCMSMS\nPivotX\nPhpTax\nCMSimple\nAlchemyCMS\nimacs\nMantis\nCollabtive\nConcrete5\nCoppermine\nCotonti\nCroogo\nCubeCart\nDolibarr\nDotclear\ne107\nEspoCRM\nEtherpad\nFluxBB\nFoswiki\nGallery\nGollum\nHelpDEZk\nHumHub\nImpressCMS\nImpressPages\nJamroom\nKanboard\nKCFinder\nLiteCart\nMagnolia\nMahara\nMantisBT\nMediaWiki\nMicroweber\nMiniBB\nMODXRevolution\nMoinMoin\nNibbleblog\nOpenSourceSocialNetwork\nOpenCart\nosDate\nownCloud\nOxwall\nPBBoard\nphpBB3\nPhpGedView\nPiwigo\nPiwik\nPmWiki\nPostfixAdmin\nRedaxo\nRoundcube\nSaurusCMS\nSerendipity\nShaarli\nSimple Machines Forum\nSpinaCMS\nSquirrelMail\nTestLink\nTikiWiki\nTrac\nWikkaWiki\nZenphoto\nX-Cart\nZikula\nMoodle\nBeehive\nFUDforum\npunBB\nAcmImBoard\nBurning\nCommunity\nfusionBB\ndeluxeBB\nJFORUM\nJive\nJibit\nNear\nOVBB\nTikiWiki\nSPIP\nConcrete5" > cmstmp
	verify=$(grep -c -i "$cms" cmstmp)
	if [[ $cms == "null" ]];then
		echo ""
		echo -e " \e[38;5;196;1m[#] CMS not detected.\e[0m"
		echo ""
		echo "-------------------------------------------------------------"
		echo ""
		exit 0
	elif [[ $verify == 0 ]];then
		echo ""   
        echo -e " \e[38;5;196;1m[#] The CMS is not on the tool database.\e[0m"
        echo ""
        echo "-------------------------------------------------------------"
		echo ""
		exit 0
   	else
   		echo ""
        echo -e " \e[1;92m[+] CMS found on the tool database.\e[0m "
        echo -e " \e[1m[-]Wanna check wich tools can you use? [y/n] \e[0m" 
        read -s checkyn
        echo ""
	fi
}

#CMSToolscheck function
cmstoolscheck()
{
	case $checkyn in
	    Y|y|s|S|"")	 	
	 	;;
	    n|N)
			echo ""
			echo -e " \e[1;36mBye bye.\e[0m"
			echo ""
			trashdel
			exit 0
	    ;;	 
	    *)
			echo ""
			trashdel
			exit 0
		;;
	esac
}

#CMSTools
cmstools()
{
	xbf=$(echo $XBruteForcer | cut -d "-" -f 5 | grep -c -i "$cms")
	CMSs4=$(echo $CMSsc4n | cut -d "-" -f 5 | grep -c -i "$cms")
	CMSon=$(echo $CoMisSion | cut -d "-" -f 5 | grep -c -i "$cms")
	droop=$(echo $droopescan | cut -d "-" -f 5 | grep -c -i "$cms")
	map=$(echo $CMSmap | cut -d "-" -f 5 | grep -c -i "$cms")
	joom=$(echo $JoomScan | cut -d "-" -f 5 | grep -c -i "$cms")
	bee=$(echo $beecms | cut -d "-" -f 5 | grep -c -i "$cms")
	dumb=$(echo $Dumb0 | cut -d "-" -f 5 | grep -c -i "$cms")
	vbs=$(echo $VBScan | cut -d "-" -f 5 | grep -c -i "$cms")
	joom2=$(echo $JoomlaScan | cut -d "-" -f 5 | grep -c -i "$cms")
	c5=$(echo $c5scan | cut -d "-" -f 5 | grep -c -i "$cms")
	t3=$(echo $T3scan | cut -d "-" -f 5 | grep -c -i "$cms")
	pup=$(echo $Puppet | cut -d "-" -f 5 | grep -c -i "$cms")
	mood=$(echo $moodlescan | cut -d "-" -f 5 | grep -c -i "$cms")
	spip=$(echo $SPIPScan | cut -d "-" -f 5 | grep -c -i "$cms")
	wphu=$(echo $WPHunter | cut -d "-" -f 5 | grep -c -i "$cms")
	wpsek=$(echo $WPSeku | cut -d "-" -f 5 | grep -c -i "$cms")
	acdr=$(echo $acdrupal | cut -d "-" -f 5 | grep -c -i "$cms")
	plo=$(echo $Plown | cut -d "-" -f 5 | grep -c -i "$cms")
	pyf=$(echo $pyfiscan | cut -d "-" -f 5 | grep -c -i "$cms")
	con=$(echo $conscan | cut -d "-" -f 5 | grep -c -i "$cms")
	cmsss=$(echo $CMSScanner | cut -d "-" -f 5 | grep -c -i "$cms")
	cmse=$(echo $cmsexplorer | cut -d "-" -f 5 | grep -c -i "$cms")
	wpsc=$(echo $WPScan | cut -d "-" -f 5 | grep -c -i "$cms")
	xplsc=$(echo $XPL | cut -d "-" -f 5 | grep -c -i "$cms")
	jme=$(echo $JoomME | cut -d "-" -f 5 | grep -c -i "$cms")
	wme=$(echo $WordPressME | cut -d "-" -f 5 | grep -c -i "$cms")
	cef=$(echo $CMSEF | cut -d "-" -f 5 | grep -c -i "$cms")
	lcms=$(echo $Lotus | cut -d "-" -f 5 | grep -c -i "$cms")
	bmcms=$(echo $BadMod | cut -d "-" -f 5 | grep -c -i "$cms")
	moo=$(echo $MooScan | cut -d "-" -f 5 | grep -c -i "$cms")
	xa=$(echo $XAttacker | cut -d "-" -f 5 | grep -c -i "$cms")
	mob=$(echo $M0B | cut -d "-" -f 5 | grep -c -i "$cms")
	lmfi=$(echo $LetMeFuckIt | cut -d "-" -f 5 | grep -c -i "$cms")
	mcms=$(echo $magescan | cut -d "-" -f 5 | grep -c -i "$cms")
	pcms=$(echo $PRESTA | cut -d "-" -f 5 | grep -c -i "$cms")
	scms=$(echo $sc | cut -d "-" -f 5 | grep -c -i "$cms")
	ekcms=$(echo $ektrone | cut -d "-" -f 5 | grep -c -i "$cms")
	lrs=$(echo $LiferayScan | cut -d "-" -f 5 | grep -c -i "$cms")
	ifl=$(echo $InfoLeak | cut -d "-" -f 5 | grep -c -i "$cms")
	jlavs=$(echo $joomlavs | cut -d "-" -f 5 | grep -c -i "$cms")
	was=$(echo $WAScan | cut -d "-" -f 5 | grep -c -i "$cms")
	rhw=$(echo $RedHawk | cut -d "-" -f 5 | grep -c -i "$cms")
	hostsbf=$(echo $HostileSBF | cut -d "-" -f 5 | grep -c -i "$cms")

	echo "-------------------------------------------------------------"
	echo ""
	echo -e " \e[1m[-] Available tools for \e[1;36m$cms:\e[0m"
	echo ""
	echo ""
	echo "" > tmptools
	echo -e " \e[1m           TOOL        - ID -         UTILITY\e[0m" >> tmptools
	echo "     --" >> tmptools

	if [[ $xbf == 1 ]];then
		echo "     "$XBruteForcer | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $CMSs4 == 1 ]]; then
		echo "     "$CMSsc4n | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $CMSon == 1 ]]; then
		echo "     "$CoMisSion | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $droop == 1 ]]; then
		echo "     "$droopescan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $map == 1 ]]; then
		echo "     "$CMSmap | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $joom == 1 ]]; then
		echo "     "$JoomScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $bee == 1 ]]; then
		echo "     "$beecms | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $dumb == 1 ]]; then
		echo "     "$Dumb0 | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $vbs == 1 ]]; then
		echo "     "$VBScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $joom2 == 1 ]]; then
		echo "     "$JoomlaScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $c5 == 1 ]]; then
		echo "     "$c5scan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $t3 == 1 ]]; then
		echo "     "$T3scan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $pup == 1 ]]; then
		echo "     "$Puppet | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $mood == 1 ]]; then
		echo "     "$moodlescan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $spip == 1 ]]; then
		echo "     "$SPIPScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $wphu == 1 ]]; then
		echo "     "$WPHunter | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $wpsek == 1 ]]; then
		echo "     "$WPSeku | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $acdr == 1 ]]; then
		echo "     "$acdrupal | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $plo == 1 ]]; then
		echo "     "$Plown | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $pyf == 1 ]]; then
		echo "     "$pyfiscan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $con == 1 ]]; then
		echo "     "$conscan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $cmsss == 1 ]]; then
		echo "     "$CMSScanner | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $cmse == 1 ]]; then
		echo "     "$cmsexplorer | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $wpsc == 1 ]]; then
		echo "     "$WPScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $xplsc == 1 ]]; then
		echo "     "$XPL | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $jme == 1 ]]; then
		echo "     "$JoomME | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $wme == 1 ]]; then
		echo "     "$WordPressME | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $cef == 1 ]]; then
		echo "     "$CMSEF | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $lcms == 1 ]]; then
		echo "     "$Lotus | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $bmcms == 1 ]]; then
		echo "     "$BadMod | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $moo == 1 ]]; then
		echo "     "$MooScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $mob == 1 ]]; then
		echo "     "$M0B | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $lmfi == 1 ]]; then
		echo "     "$LetMeFuckIt | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $mcms == 1 ]]; then
		echo "     "$magescan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $pcms == 1 ]]; then
		echo "     "$PRESTA | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $scms == 1 ]]; then
		echo "     "$sc | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $ekcms == 1 ]]; then
		echo "     "$ektrone | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $lrs == 1 ]]; then
		echo "     "$LiferayScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $ifl == 1 ]]; then
		echo "     "$InfoLeak | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $jlavs == 1 ]]; then
		echo "     "$joomlavs | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $was == 1 ]]; then
		echo "     "$WAScan | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $rhw == 1 ]]; then
		echo "     "$RedHawk | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	if [[ $hostsbf == 1 ]]; then
		echo "     "$HostileSBF | cut -d "-" -f 1,2,3 >> tmptools
		echo "     --" >> tmptools
	fi
	column -t -s "-" tmptools
	echo ""
}

#CMStoolsaskdown
cmstoolsaskdown()
{
	echo "-------------------------------------------------------------"
	echo ""
	echo -e " \e[1m[-] Wanna use any tool in the table? [y/n]\e[0m"
	read -s checkyn
}

#cmstoolsgit
cmstoolsgit()
{
	echo ""
	cat tmptools | cut -d "-" -f 1 | grep -v "_" > tmptools2
	sed -i -e "1d;2d" tmptools2
	echo -e " \e[1m[-] Enter the tool ID\e[0m:"
	read -s -a id
	idver=$(echo ${id[@]} | grep -o " " | wc -l)
	#idver=$(echo $idver + 1 | bc)

	
	
	while read line;
	do	
		con=0
		con2=0
		while [[ $con -le $idver ]]
			do
			echo ${!line} | grep -w -c "${id[$con2]}" > tmpver
			tmpverr=$(cat tmpver)
			
				if [[  $tmpverr == "1" ]];then
					echo ${!line} | cut -d "-" -f 4 > tmpgit
					github=$(cat tmpgit)
					echo ""
					git clone $github /root/cmstools/$line
					echo ""
					echo -e " \e[1;36m[+] Tool cloned in\e[0m \e[1;96m/root/cmstools/$line.\e[0m"
					echo ""
					(( con2 += 1 ))
					(( con += 1 ))
				else
					(( con2 += 1 ))
					(( con += 1 ))
				fi
			done		
			
	done < tmptools2
}

#Help function
helpf()
{
	
	coomandarray=("-h" '-wh' '--tools' )
	msgarray=('Display this help message' 'Check hosting details' 'Tools information')
	array_size=3
	echo ""
	echo -e " \e[1m[+] Usage:\e[0m \e[3m./whatcms.sh example.com\e[0m"
	echo ""
	echo -e " \e[1m[+] Command list:\e[0m"
	echo ""

	for((i=0;i<array_size;i++))
	do
    	echo "      " ${coomandarray[$i]} $'\x1d' ${msgarray[$i]}
	done | column -t -s$'\x1d'
}

#Toolspack function
toolspack()
{
	cms=""
	cmstools
}

#Tools info
XBruteForcer=' XBruteForcer - 1 - Brute Force Tool - https://github.com/Moham3dRiahi/XBruteForcer - WordPress, Joomla, DruPal, OpenCart, Magento' 
CMSsc4n=' CMSsc4n - 2 - Identify Tool - https://github.com/n4xh4ck5/CMSsc4n - Wordpress, Moodle, Joomla, Drupal, Prestashop'
CoMisSion=' CoMisSion - 3 - Analyze Tool - https://github.com/Intrinsec/comission - Wordpress, Drupal'
droopescan=' droopescan - 4 - Analyze Tool - https://github.com/droope/droopescan - Drupal, SilverStripe CMS, Wordpress, Joomla, Moodle'
CMSmap=' CMSmap - 5 - Analyze Tool - https://github.com/Dionach/CMSmap - WordPress, Joomla, Drupal'
JoomScan=' JoomScan - 6 - Analyze Tool - https://github.com/rezasp/joomscan - Joomla'
beecms=' beecms - 7 - Exploit Tool - https://github.com/CHYbeta/cmsPoc - beecms'
Dumb0=' Dumb0 - 8 - Username Scrapper Tool - https://github.com/0verl0ad/Dumb0/ - Simple Machines Forum, Invision, Xen, vBulletin, myBB, useBB, vanilla, bbPress, WordPress, SPIP, Drupal, Moodle, Beehive, fluxBB, FUDforum, punBB, AcmImBoard, Burning, Community, deluxeBB, fusionBB, JFORUM, Jibit, Jive, Near, OVBB, TikiWiki'
VBScan=' VBScan - 9 - Analyze Tool - https://github.com/rezasp/vbscan - vBulletin'
JoomlaScan=' JoomlaScan - 10 - Analyze Tool - https://github.com/drego85/JoomlaScan - Joomla'
c5scan=' c5scan - 11 - Analyze Tool - https://github.com/auraltension/c5scan - Concrete5'
T3scan=' T3scan - 12 - Analyze Tool - https://github.com/Oblady/T3Scan - TYPO3'
Puppet=' Puppet - 13 - Identify Tool - https://github.com/Poil/puppet-websites-facts - Joomla, Drupal, Wordpress, PHPBB, Magento, EZPublish, Typo3, PhpMyAdmin, Mantis, SPIP'
moodlescan=' moodlescan - 14 - Analyze Tool - https://github.com/inc0d3/moodlescan - Moodle'
SPIPScan=' SPIPScan - 15 - Analyze Tool - https://github.com/PaulSec/SPIPScan - SPIP'
WPHunter=' WPHunter - 16 - Analyze Tool - https://github.com/aryanrtm/WP-Hunter - WordPress'
WPSeku=' WPSeku - 17 - Analyze Tool - https://github.com/m4ll0k/WPSeku - WordPress'
acdrupal=' ACDrupal - 18 - Analyze Tool - https://github.com/mrmtwoj/ac-drupal - Drupal'
Plown=' Plown - 19 - Analyze Tool - https://github.com/unweb/plown - Plown'
pyfiscan=' pyfiscan - 20 - Identify Tool - https://github.com/fgeek/pyfiscan - ATutor, b2evolution, BigTree CMS, Bugzilla, Centreon, Claroline, ClipperCMS, CMSimple, CMSMS, Collabtive, Concrete5, Coppermine, Cotonti, Croogo, CubeCart, Dolibarr, Dotclear, Drupal, e107, EspoCRM, Etherpad, FluxBB, Foswiki, Gallery, Gollum, HelpDEZk, HumHub, ImpressCMS, ImpressPages, Jamroom, Joomla, Kanboard, KCFinder, LiteCart, Magnolia, Mahara, MantisBT, MediaWiki, Microweber, MiniBB, MODX Revolution, MoinMoin, MyBB, Nibbleblog, Open Source Social Network, OpenCart, osDate, ownCloud, Oxwall, PBBoard, phpBB3, PhpGedView, phpMyAdmin, Piwigo, Piwik, PmWiki, Postfix Admin, Redaxo, Roundcube, SaurusCMS, Serendipity, Shaarli, Simple Machines Forum, Spina CMS, SPIP, SquirrelMail, TestLink, TikiWiki, Trac, WikkaWiki, WordPress, X-Cart, Zenphoto, Zikula'
conscan=' conscan - 21 - Analyze Tool - https://github.com/nullsecuritynet/tools/tree/master/scanner/conscan - Concrete5'
CMSScanner=' CMSScanner - 22 - Analyze Tool - https://github.com/CMS-Garden/cmsscanner - Contao, CONTENIDO, Drupal, Joomla, TYPO3 CMS, WordPress, Prestashop, Alchemy CMS, PivotX, Concrete5'
cmsexplorer=' cmsExplorer - 23 - Analyze Tool - https://code.google.com/archive/p/cms-explorer/ - Drupal, Wordpress, Joomla, Mambo'
WPScan=' WPScan - 24 - Analyze Tool - https://github.com/wpscanteam/wpscan - WordPress'
XPL=' CMSXPL - 25 - Exploit Tool - https://github.com/tanprathan/CMS-XPL - 230cms, Bloofox, WeBid, Wolf, Betoffice, Fly-High, Havalite, imacs, PhpTax'
JoomME=' JMassExploiter - 26 - Exploit Tool - https://github.com/anarcoder/JoomlaMassExploiter - Joomla'
WordPressME=' WPMassExploiter - 27 - Exploit Tool - https://github.com/anarcoder/WordPressMassExploiter - Wordpress'
CMSEF=' CMSExpFram - 28 - Exploit Tool - https://github.com/Q2h1Cg/CMS-Exploit-Framework - Wordpress, ThinkPHP, Discuz, StartBBS, WaiKu, AllCMS'
Lotus=' LotusXploit - 29 - Exploit Tool - https://github.com/Hood3dRob1n/LotusCMS-Exploit - Lotus'
BadMod=' BadMod - 30 - Exploit Tool - https://github.com/MrSqar-Ye/BadMod - Wordpress, Drupal, Joomla, MadeSimple'
MooScan=' MooScan - 31 - Analyze Tool - https://github.com/vortexau/mooscan - Moodle'
XAttacker=' XAttacker - 32 - Exploit Tool -	https://github.com/Moham3dRiahi/XAttacker - Wordpress, Joomla, Drupal, Lokomedia, Prestashop'	
M0B=' M0B - 33 - Exploit Tool - https://github.com/mobrine-mob/M0B-tool - Wordpress, Magento, Joomla, Drupal, OpenCart'
LetMeFuckIt=' LetMeFuckIt - 34 - Exploit Tool - https://github.com/onthefrontline/LetMeFuckIt-Scanner - Magento'
magescan=' magescan - 35 - Exploit Tool - https://github.com/steverobbins/magescan - Magento'
PRESTA=' PRESTA - 36 - Exploit Tool - https://github.com/AlisamTechnology/PRESTA-modules-shell-exploit - Prestashop'
sc=' Scanners - 37 - Analyze Tool - https://github.com/b3o1/Scanners - Wordpress, Joomla'
ektrone=' EktronE - 38 - Exploit Tool - https://github.com/tomkallo/Ektron_CMS_8.02_exploit - Ektron'
LiferayScan=' LiferayScan - 39 - Analyze Tool - https://github.com/bcoles/LiferayScan - Liferay'
InfoLeak=' InfoLeak - 40 - Analyze Tool - https://github.com/SIWECOS/InfoLeak-Scanner - Drupal, Joomla, vbulletin, Veyton, Webspell, Wordpress, xt-commerce'
joomlavs=' joomlavs - 41 - Analyze Tool - https://github.com/rastating/joomlavs - Joomla'
WAScan=' WAScan - 42 - Analyze Tool - https://github.com/m4ll0k/WAScan - Drupal, SilverStripe CMS, Joomla, Magento, Wordpress, Plone'
RedHawk=' RedHawk - 43 - Analyze Tool - https://github.com/Tuhinshubhra/RED_HAWK - Wordpress, Drupal, Joomla, Magento'
HostileSBF=' HostileSBF - 44 - Analyze Tool - https://github.com/nahamsec/HostileSubBruteforcer - AWS, Github, Heroku, shopify, tumblr, squarespace'

#-------------------------------------------------------------------------------------------------------------------------------
banner
apikeycheck
domaincheck $1
if [[ -z $1 ]];then
	helpf
	echo ""
	trashdel
	exit 0
else
	if [[ $verify != "0" ]];then
		whatcms $1
		if [[ $2 == "-wh" ]];then
			sleep 9
			whohost $1
		fi
		cmstoolsask
		cmstoolscheck
		cmstools
		cmstoolsaskdown
		cmstoolscheck
		cmstoolsgit
	else
		if [[ $1 != "" ]];then
			if [[ $1 == "--tools" ]];then
				echo ""
				toolspack
				echo ""
				exit 0
			elif [[ $1 == "--help" ]] || [[ $1 == "-h" ]];then
				helpf
				echo ""
				exit 0
			elif [[ $1 != "--help" ]] || [[ $1 != "--tools" ]] || [[ $1 != "-h" ]]; then
				echo ""
				echo -e " \e[38;5;196;1m[#] Invalid domain or parameter\e[0m"
				echo ""
			else
				echo ""
				trashdel
				exit 0
			fi
		fi
	fi
fi

trashdel
exit 0
Download .txt
gitextract_eho15s6l/

├── README.md
└── whatcms.sh
Condensed preview — 2 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (29K chars).
[
  {
    "path": "README.md",
    "chars": 3789,
    "preview": "# WhatCMS.sh\nCMS Detection and Exploit Kit based on **[Whatcms.org](https://whatcms.org)** API.\n\n## Introduction\nWhatcms"
  },
  {
    "path": "whatcms.sh",
    "chars": 22110,
    "preview": "#!/bin/bash\n\n#SET YOUR WHATCMS API KEY HERE\ncmsapikey=\n\n#Banner function\nbanner()\n{\n\techo \"\"\n\techo \"--------------------"
  }
]

About this extraction

This page contains the full source code of the HA71/WhatCMS GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 2 files (25.3 KB), approximately 9.6k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!