Ir al contenido

CMSeeK

CMSeeK is a powerful CMS detection and exploitation suite designed for penetration testers and security researchers. It automatically identifies 180+ content management systems (WordPress, Joomla, Drupal, Magento, etc.) and provides vulnerability scanning with automatic exploit suggestions. The tool streamlines reconnaissance and vulnerability assessment during security audits.

  • Python 3.x
  • Git
  • pip
git clone https://github.com/Tuhinshubhra/CMSeeK.git
cd CMSeeK
pip install -r requirements.txt
python3 cmseek.py
chmod +x cmseek.py
python3 cmseek.py -u http://target.com
docker pull tuhinshubhra/cmseek
docker run -it tuhinshubhra/cmseek python3 cmseek.py -u http://target.com
CommandDescription
python3 cmseek.py -u <url>Detect CMS on target URL
python3 cmseek.py -u <url> -vVerbose output with detailed info
python3 cmseek.py -u <url> --followFollow redirects
python3 cmseek.py -u <url> --timeout 20Set custom timeout in seconds
python3 cmseek.py --helpDisplay help menu
python3 cmseek.py -u http://example.com

Output includes:

  • CMS name and version
  • Detection confidence
  • Admin panel location
  • Vulnerable components
  • Recommended exploits
python3 cmseek.py -u http://example.com -a "Mozilla/5.0 (Windows NT 10.0; Win64; x64)"
python3 cmseek.py -l urls.txt

Create urls.txt:

http://target1.com
http://target2.com
http://target3.com
python3 cmseek.py -u http://example.com --cms wordpress
python3 cmseek.py -u http://example.com --force-cms joomla

Supported CMS platforms:

  • WordPress
  • Joomla
  • Drupal
  • Magento
  • OpenCart
  • PrestaShop
  • Concrete5
  • Ghost
  • Typo3
python3 cmseek.py -u http://example.com -o report.html
python3 cmseek.py -u http://example.com --proxy http://127.0.0.1:8080
python3 cmseek.py -u http://example.com --socks5 127.0.0.1:1080
python3 cmseek.py -u https://example.com --no-ssl-verify
python3 cmseek.py -u https://example.com --cert /path/to/cert.pem
python3 cmseek.py -l urls.txt --follow --timeout 15 -v
python3 cmseek.py -u http://example.com --cms wordpress

CMSeeK detects:

  • WordPress version
  • Active plugins
  • Active themes
  • Vulnerable plugins
  • Admin panel location (usually /wp-admin/)
python3 cmseek.py -u http://example.com -e wordpress
python3 cmseek.py -u http://example.com --cms joomla

Identifies:

  • Joomla version
  • Installed components
  • Vulnerable extensions
  • Administrator panel
python3 cmseek.py -u http://example.com --force-cms joomla --vuln
python3 cmseek.py -u http://example.com --cms drupal

Detects:

  • Drupal version
  • Installed modules
  • Vulnerable modules
  • Core vulnerabilities
python3 cmseek.py -u http://example.com -e drupal-modules
python3 cmseek.py -u http://example.com --exploit

CMSeeK provides:

  • CVE numbers
  • Vulnerability descriptions
  • PoC links
  • Remediation steps
python3 cmseek.py -u http://example.com -e all
python3 cmseek.py -u http://example.com --db /custom/exploits/
python3 cmseek.py -u http://example.com -o results.html
python3 cmseek.py -u http://example.com -j results.json
python3 cmseek.py -l urls.txt -c results.csv
python3 cmseek.py -u http://example.com -v
~/.cmseek/config.conf
[DEFAULT]
timeout = 10
follow_redirects = true
user_agent = custom_ua
proxy = http://127.0.0.1:8080
threads = 5
python3 cmseek.py -u http://example.com --config custom.conf
python3 cmseek.py -l urls.txt --threads 10
python3 cmseek.py -u http://example.com --timeout 30
python3 cmseek.py -l urls.txt --keepalive
python3 cmseek.py -u http://example.com --headers

Checks for:

  • X-Frame-Options
  • Content-Security-Policy
  • X-Content-Type-Options
  • HSTS
python3 cmseek.py -u http://example.com --header "Authorization: Bearer token"
python3 cmseek.py -u http://example.com --skip wordpress,joomla
python3 cmseek.py -u http://example.com --only drupal
python3 cmseek.py -l urls.txt --filter "*.edu"
python3 cmseek.py -u http://example.com -v -e all -o report.html
python3 cmseek.py -l sites.txt --threads 5 -o results.html
python3 cmseek.py -u http://example.com --cms wordpress --vuln --exploit
python3 cmseek.py -u http://example.com --version-only
python3 cmseek.py -u http://example.com --timeout 60 --follow
python3 cmseek.py -u https://example.com --no-ssl-verify
python3 cmseek.py -u http://example.com --proxy http://user:pass@127.0.0.1:8080
python3 cmseek.py --update-db
# Checks wp-content directory
# Looks for wp-includes files
# Scans readme.html
# Identifies wp-admin panel
# Checks media/jui/css
# Scans robots.txt patterns
# Looks for administrator panel
# Detects Joomla version patterns

CMSeeK uses:

  • HTTP header analysis
  • Source code fingerprinting
  • Cookie patterns
  • Directory enumeration
  • Version detection signatures
  1. Always obtain authorization before scanning production systems
  2. Use appropriate timeouts to avoid overwhelming target servers
  3. Respect rate limits when scanning multiple URLs
  4. Review results carefully - false positives can occur
  5. Keep exploit database updated regularly
  6. Use proxies/VPNs to maintain operational security
  7. Document all findings in reports

CMSeeK is designed for authorized security testing only. Ensure you have explicit permission from the system owner before conducting vulnerability assessments. Unauthorized access to computer systems is illegal.