Top Related Projects
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
fsociety Hacking Tools Pack – A Penetration Testing Framework
Exploitation Framework for Embedded Devices
The Rogue Access Point Framework
Quick Overview
Xerosploit is an open-source penetration testing toolkit designed for network auditing and security assessment. It provides a collection of tools and scripts for various network attacks, including man-in-the-middle (MITM) attacks, ARP spoofing, and DNS spoofing. Xerosploit is primarily intended for educational purposes and ethical hacking.
Pros
- Comprehensive suite of network security tools in one package
- User-friendly command-line interface for easy navigation and tool selection
- Regular updates and community contributions
- Supports various attack vectors and network manipulation techniques
Cons
- Potential for misuse if not used responsibly or ethically
- Limited documentation and user guides
- Some tools may require additional dependencies or configuration
- Not suitable for beginners without proper knowledge of network security concepts
Getting Started
To get started with Xerosploit, follow these steps:
-
Clone the repository:
git clone https://github.com/LionSec/xerosploit.git
-
Navigate to the Xerosploit directory:
cd xerosploit
-
Run the installation script:
sudo python install.py
-
Launch Xerosploit:
sudo xerosploit
-
Use the built-in menu to select and execute desired tools and attacks.
Note: Xerosploit should only be used on networks and systems you have explicit permission to test. Always follow ethical hacking guidelines and local laws when using this toolkit.
Competitor Comparisons
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Pros of social-engineer-toolkit
- More comprehensive toolkit with a wider range of social engineering attacks
- Regularly updated with new features and security patches
- Extensive documentation and community support
Cons of social-engineer-toolkit
- Steeper learning curve due to its extensive feature set
- Requires more system resources to run effectively
- May be overkill for simpler penetration testing tasks
Code Comparison
social-engineer-toolkit:
# Multi-Attack Web Method
def multi_attack_web():
choice = raw_input(setprompt(["2"], "Select from the menu:\n\n 1) Java Applet Attack Method\n 2) Metasploit Browser Exploit Method\n 3) Credential Harvester Attack Method\n 4) Tabnabbing Attack Method\n 5) Web Jacking Attack Method\n 6) Multi-Attack Vector web attack\n 7) Return to the previous menu\n\n"))
xerosploit:
# Main menu
def main():
print "\n"
print "Select from the menu:"
print "1) Scan Network"
print "2) ARP Spoofing"
print "3) DNS Spoofing"
print "4) Inject HTML"
print "5) Sniff Traffic"
print "6) Kill Connections"
Both tools offer menu-driven interfaces, but social-engineer-toolkit provides a more extensive range of attack options compared to xerosploit's focused network manipulation features.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Pros of bettercap
- More actively maintained with frequent updates
- Broader feature set, including WiFi and Bluetooth capabilities
- Modular architecture allowing for easy extension
Cons of bettercap
- Steeper learning curve due to more complex functionality
- Requires more system resources to run effectively
Code comparison
xerosploit:
def get_gateway():
gateway = check_output("route -n | grep 'UG[ \t]' | awk '{print $2}'", shell=True).decode().strip()
return gateway
bettercap:
func FindGateway(iface *net.Interface) (*Endpoint, error) {
ifName := iface.Name
output, err := core.Exec("ip", []string{"route", "show", "dev", ifName})
if err != nil {
return nil, err
}
// ... (parsing logic)
}
Both tools aim to perform network attacks and reconnaissance, but bettercap offers a more comprehensive and modern approach. xerosploit is Python-based and focuses on simpler network manipulation, while bettercap is written in Go and provides a wider range of features. bettercap's modular design allows for greater flexibility, but it may be overwhelming for beginners. xerosploit is easier to use but has limited functionality compared to bettercap.
fsociety Hacking Tools Pack – A Penetration Testing Framework
Pros of fsociety
- More comprehensive toolset with a wider range of functionalities
- Active development and regular updates
- Larger community and user base
Cons of fsociety
- Potentially overwhelming for beginners due to the extensive feature set
- May require more system resources due to its broader scope
Code Comparison
fsociety:
def menu():
clearScr()
print (logo + """
[1] Information Gathering
[2] Password Attacks
[3] Wireless Testing
[4] Exploitation Tools
[5] Sniffing & Spoofing
""")
xerosploit:
def menu():
print("""
[1] Network Mapping
[2] ARP Poisoning
[3] DNS Spoofing
[4] Inject HTML
[5] Sniff Traffic
""")
The code comparison shows that fsociety offers a broader range of attack categories, while xerosploit focuses more on specific network-based attacks. This reflects the overall difference in scope between the two projects, with fsociety providing a more comprehensive toolkit and xerosploit concentrating on network exploitation techniques.
Exploitation Framework for Embedded Devices
Pros of RouterSploit
- More comprehensive and focused on router exploitation
- Actively maintained with regular updates
- Larger community and contributor base
Cons of RouterSploit
- Steeper learning curve for beginners
- More complex setup and configuration
Code Comparison
RouterSploit:
from routersploit.core.exploit import *
from routersploit.core.http.http_client import HTTPClient
class Exploit(HTTPClient):
__info__ = {
"name": "Example Exploit",
"description": "Example exploit description",
}
Xerosploit:
import os
import sys
from time import sleep
def banner():
print("\033[1;32m")
print("XeroSploit v1.0")
print("\033[1;m")
RouterSploit uses a more structured approach with classes and modules, while Xerosploit has a simpler, script-like structure. RouterSploit's code is more organized and follows object-oriented principles, making it easier to extend and maintain. Xerosploit's code is more straightforward but may be less flexible for complex scenarios.
RouterSploit is better suited for advanced users and security professionals focusing on router exploitation, while Xerosploit offers a simpler interface for general network attacks and may be more approachable for beginners. However, RouterSploit's active development and larger community make it a more robust and up-to-date option for those willing to invest time in learning its features.
The Rogue Access Point Framework
Pros of Wifiphisher
- More actively maintained with regular updates
- Supports a wider range of attack scenarios and phishing templates
- Better documentation and community support
Cons of Wifiphisher
- More complex setup and configuration required
- Limited to Wi-Fi attacks, less versatile than Xerosploit
- Requires specific wireless adapter compatibility
Code Comparison
Wifiphisher (Python):
def start(self):
if not self.internet_info_manager.is_interface_valid():
self.network_manager.set_interface_mode(self.interface, "managed")
self.template.merge_interface_info(self.network_manager.get_interfaces())
self.network_manager.start()
Xerosploit (Bash):
function xerosploit {
clear
echo -e "$red[+]$green Xerosploit Toolkit"
echo -e "$red[+]$green Created by LionSec"
echo -e "$red[+]$blue Select an option from menu:"
echo -e "\t$red[1]$blue Scan Network"
echo -e "\t$red[2]$blue ARP Spoofing"
}
Both tools focus on network attacks, but Wifiphisher is more specialized for Wi-Fi phishing, while Xerosploit offers a broader range of network exploitation features. Wifiphisher's code is more modular and object-oriented, while Xerosploit relies on shell scripting for its functionality.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
Xerosploit
Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Powered by bettercap and nmap.
Dependencies
- nmap
- hping3
- build-essential
- ruby-dev
- libpcap-dev
- libgmp3-dev
- tabulate
- terminaltables
Instalation
Dependencies will be automatically installed.
git clone https://github.com/LionSec/xerosploit
cd xerosploit && sudo python install.py
sudo xerosploit
Tested on
Operative system | Version |
---|---|
Ubuntu | 16.04 / 15.10 |
Kali linux | Rolling / Sana |
Parrot OS | 3.1 |
features
- Port scanning
- Network mapping
- Dos attack
- Html code injection
- Javascript code injection
- Download intercaption and replacement
- Sniffing
- Dns spoofing
- Background audio reproduction
- Images replacement
- Drifnet
- Webpage defacement and more ...
Demonstration
https://www.youtube.com/watch?v=35QUrtZEV9U
I have some questions!
Please visit https://github.com/LionSec/xerosploit/issues
Donations
- Paypal : https://www.paypal.me/lionsec
- Bitcoin : 12dM5kZjYMizNuXaqu7QZBLNDkXjfKYpRD
Contact
- Website : https://neodrix.com
- Youtube : https://youtube.com/inf98es
- Facebook : https://facebook.com/in98
- Twitter: @LionSec1
- Email : informatic98es@gmail.com
Top Related Projects
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
fsociety Hacking Tools Pack – A Penetration Testing Framework
Exploitation Framework for Embedded Devices
The Rogue Access Point Framework
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot