WP-Reaper is a professional-grade, high-performance security auditing and exploitation framework with one ultimate mission: to automatically detect and validate CVEs across WordPress websites.
![]()
WP-Reaper is a professional-grade, high-performance security auditing and exploitation framework with one ultimate mission: to automatically detect and validate CVEs across WordPress websites. Built exclusively for modern penetration testers, bug bounty hunters, and red teamers, WP-Reaper cuts through the noise to find real, exploitable WordPress vulnerabilities.
Forget about tangled Python environments and missing dependencies. WP-Reaper is distributed as a standalone, lightning-fast compiled binary for Linux, ready to deploy into any engagement environment in seconds.
While traditional scanners stop at simply "detecting" outdated plugins, WP-Reaper takes the leap into active exploitation and validation. It fuses the deep enumeration capabilities of WPScan with the devastating speed of Nuclei, wrapping it all into a seamless, autonomous kill-chain.
.bin (Linux). Zero pip installs, zero environment setup.⚠️ IMPORTANT: If these built-in community tokens run out of daily requests, you MUST supply your own personal WPScan API key using the -a flag to continue scanning.
While WP-Reaper itself is distributed as a zero-dependency binary orchestrator, it relies on the following core penetration testing tools being installed and accessible in your system's global PATH:
Make sure you can run wpscan, nuclei, and vulnx from your terminal before launching WP-Reaper!
WP-Reaper is compiled for maximum compatibility and performance:
wp-reaper-linux.bin(Note: Ensure your operating system allows execution of the binary before running).
Deploy WP-Reaper instantly from your terminal:
chmod +x wp-reaper-linux.bin
./wp-reaper-linux.bin -u https://target-site.com
./wp-reaper-linux.bin -l massive_target_list.txt -a YOUR_PRIVATE_API_TOKEN
| Flag | Description | Requirement |
|---|---|---|
-u, --url | Single target URL to analyze and exploit. | Required (or use -l) |
-l, --list | Text file containing a list of target URLs for mass exploitation. | Required (or use -u) |
-a, --api | Personal WPScan API Token. Required if the built-in community API pool is exhausted. | Conditional |
![]()
![]()
WP-Reaper doesn't just print green text to a console. At the end of every engagement, it generates a report_premium_XXXX.html file in the current directory.
![]()
This report is designed to impress clients and Bug Bounty triagers immediately:
Elevate your arsenal. Harvest the vulnerabilities. Get WP-Reaper today.