Wordpress eBook Download 1.1 plugin has a file disclosure vulnerability by abusing it's get parameter in the filedownload.php file.
This script brute forces different processes on the server using this vulnerability.
USAGE: python pidbrute.py <IPADDRESS>
[4.0K] /data/pocs/5559b19db4625307b6d3ad57914c44b01bf46344
├── [1.1K] pidbrute.py
└── [ 256] README.md
0 directories, 2 files