Roxysploit - A hackers framework

Roxysploit is an open-source community and a suite of penetration tests that supports attacks of many scenarios.

How to download and install the Roxysploit?

Step 1:

First of all, we need to download the Roxysploit tool so type the below command on your terminal.

									git clone https://github.com/andyvaikunth/roxysploit.git				

Roxysploit – A hackers framework

Step 2:

Now change the directory to Roxysploit so run the below command

									cd roxysploit				

Roxysploit – A hackers framework

Step 3:

Then permit to read write and execute of roxy.py python file and install bash scripts, so execute the below commands

									chmod +x installchmod +x roxy.py				

Roxysploit – A hackers framework

Step 4:

After that install and run the Roxysploit tool so run the following commands

									sudo /bin/bash installpytrhon roxy.py				

Roxysploit – A hackers framework

Options

A scan is an automated Information gathering plugin it gives the user the ability to have a rest while the best Information gathering plugin can be executed.

Jailpwn is a useful plugin for any iPhone device that has been jailbroken it will attempt to login to the ssh using its default password giving you a full shell.

Eternalblue is a recent plugin we added it Exploits a vulnerability on SMBv1/SMBv2 protocols these were collected from the NSA cyberweapons.

Internalroute Exploits multiple vulnerabilities in routers this can become very useful such as hotel wifi.

Aurora this is an old plugin that can become very useful for pen-testers it exploits Internet Explorer 6 URL vulnerability.

Doublepulsar is giving you the ability to Remotely inject a malicious DLL backdoor into a windows computer.

Kodi is a fantastic movie streaming platform but it runs on linux we have Created a malicious addon(backdoor) via kodi.tv

Bleed uses a mass vulnerability check on finding any SSL Vulnerabilities.

Trespass is a way of managing your php backdoor and gaining shell or even doing single commands it requires password authentication stopping any lurker.

A handler is commonly used to create a listener on a port.

Poppy is a MITM plugin allowing you to Arp spoof and sniffs unencrypted passwords on all protocols such as FTP and HTTP.

Redcarpet is a nice plugin keeping you safe from malicious hackers this will Encrypt a user directory.

Picklock is a local Bruteforce plugin that you can Picklock/Bruteforce Mulitple devices Pincodes such as android USB debugging.

Passby can load a USB to steal all credentials from a Windows computer in seconds.

Dnsspoof is common for man-in-the-middle attacks, it can redirect any HTTP requests to your DNS.

Smartremote is more of a funny remote exploit you can Take over a smart tv’s remote control without authentication.

Blueborne is a recent Bluetooth memory leak for all devices even cars.

Credswipe you have to have a card reader to clone them.

Rfpwn suitable device to brute force a special AM OOK or raw binary signal.

Ftpbrute Brute-force attack FTP(file transfer protocol) server Wifijammer you can Death wifi networks around your area, meaning disconnecting all users connected to the network.


Download the Github Tool

Post a Comment

Previous Post Next Post