dSploit v1.0.31b IT Security Toolkit Androidseeders: 4
leechers: 3
dSploit v1.0.31b IT Security Toolkit Android (Size: 6.38 MB)
DescriptiondSploit v1.0.31b WARNING: For obvious reasons this app will show as malware in your mobile sucurity app. Just add it to the ignore list. It Is safe. Requires an ARM cpu, a rooted device, a full BusyBox install and an Android device with at least the 2.3 (Gingerbread) version of the OS. If you have no clue what any of this means, this app is not for you. Description: The most complete and advanced IT security professional toolkit on Android. dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc . This application is still in beta stage, a stable release will be available as soon as possible, but expect some crash or strange behaviour until then, in any case, feel free to submit an issue on GitHub. You might ask why there’s the need of another tool like zAnti, NetSpoofer, DroidSheep, FaceNiff, etc. Well, first of all, the only software which is comparable to dSploit in terms of features and support is zAnti ( refer to the following comparison table ), which is a proprietary tool and obviously closed source. Don’t get me wrong, i have nothing against proprietary software, i’ve been in contact with zAnti staff for a while now, i think they’re a really great and open minded team, but closed source is closed source, there’s no community contribution and most of all, you have to pay for it. Secondly, every tool i’ve found was very specific, none of them had every feature i needed so most of the times i had to use three or four tools at a time, which is kinda frustrating. Therefore, dSploit was born, only one ( open source ) tool to rule them all! WiFi Cracking: The WiFi scanner will show in green access points with known default key generation algorithms, clicking on them allows you to easily crack the key, supported models: Thomson, DLink, Pirelli Discus, Eircom, Verizon FiOS, Alice AGPF, FASTWEB Pirelli and Telsey, Huawei, Wlan_XXXX, Jazztel_XXXX, Wlan_XX, Ono ( P1XXXXXX0000X ), WlanXXXXXX, YacomXXXXXX, WifiXXXXXX, Sky V1, Clubinternet.box v1 and v2, InfostradaWifi. RouterPWN: Launch the http://routerpwn.com/ service to pwn your router. Trace: Perform a traceroute on target. Port Scanner: A syn port scanner to find quickly open ports on a single target. Inspector: Performs target operating system and services deep detection, slower than syn port scanner but more accurate. Vulnerability Finder: Search for known vulnerabilities for target running services upon National Vulnerability Database. Login Cracker: A very fast network logon cracker which supports many different services. Packet Forger: Craft and send a custom TCP or UDP packet to the target, such as Wake On LAN packets. MITM: A set of man-in-the-midtle tools to command&conquer the whole network. Simple Sniff: Redirect target’s traffic through this device and show some stats while dumping it to a pcap file. Password Sniffer: Sniff passwords of many protocols such as http, ftp, imap, imaps, irc, msn, etc from the target. Session Hijacker: Listen for cookies on the network and hijack sessions. Kill Connections: Kill connections preventing the target to reach any website or server. Redirect: Redirect all the http traffic to another adtress. Replace Images: Replace all images on webpages with the specified one. Replace Videos: Replace all youtube videos on webpages with the specified one. Script Injection: Inject a javascript in every visited webpage. Custom Filter: Replace custom text on webpages with the specified one. Requirements: ARM: Your device must have an ARM cpu. Gingerbread: An Android device with at least the 2.3 ( Gingerbread ) version of the OS. Root: The device must be rooted. BusyBox: The device must have a BusyBox full install, this means with every utility installed ( not the partial installation ). More Info and FAQ http://www.dsploit.net/ Related Torrents
Sharing Widget |
All Comments