Convert Figma logo to code with AI

LionSec logoxerosploit

Efficient and advanced man in the middle framework

2,015
650
2,015
291

Top Related Projects

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

16,239

The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.

10,455

fsociety Hacking Tools Pack – A Penetration Testing Framework

Exploitation Framework for Embedded Devices

The Rogue Access Point Framework

Quick Overview

Xerosploit is an open-source penetration testing toolkit designed for network auditing and security assessment. It provides a collection of tools and scripts for various network attacks, including man-in-the-middle (MITM) attacks, ARP spoofing, and DNS spoofing. Xerosploit is primarily intended for educational purposes and ethical hacking.

Pros

  • Comprehensive suite of network security tools in one package
  • User-friendly command-line interface for easy navigation and tool selection
  • Regular updates and community contributions
  • Supports various attack vectors and network manipulation techniques

Cons

  • Potential for misuse if not used responsibly or ethically
  • Limited documentation and user guides
  • Some tools may require additional dependencies or configuration
  • Not suitable for beginners without proper knowledge of network security concepts

Getting Started

To get started with Xerosploit, follow these steps:

  1. Clone the repository:

    git clone https://github.com/LionSec/xerosploit.git
    
  2. Navigate to the Xerosploit directory:

    cd xerosploit
    
  3. Run the installation script:

    sudo python install.py
    
  4. Launch Xerosploit:

    sudo xerosploit
    
  5. Use the built-in menu to select and execute desired tools and attacks.

Note: Xerosploit should only be used on networks and systems you have explicit permission to test. Always follow ethical hacking guidelines and local laws when using this toolkit.

Competitor Comparisons

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

Pros of social-engineer-toolkit

  • More comprehensive toolkit with a wider range of social engineering attacks
  • Regularly updated with new features and security patches
  • Extensive documentation and community support

Cons of social-engineer-toolkit

  • Steeper learning curve due to its extensive feature set
  • Requires more system resources to run effectively
  • May be overkill for simpler penetration testing tasks

Code Comparison

social-engineer-toolkit:

# Multi-Attack Web Method
def multi_attack_web():
    choice = raw_input(setprompt(["2"], "Select from the menu:\n\n   1) Java Applet Attack Method\n   2) Metasploit Browser Exploit Method\n   3) Credential Harvester Attack Method\n   4) Tabnabbing Attack Method\n   5) Web Jacking Attack Method\n   6) Multi-Attack Vector web attack\n   7) Return to the previous menu\n\n"))

xerosploit:

# Main menu
def main():
    print "\n"
    print "Select from the menu:"
    print "1) Scan Network"
    print "2) ARP Spoofing"
    print "3) DNS Spoofing"
    print "4) Inject HTML"
    print "5) Sniff Traffic"
    print "6) Kill Connections"

Both tools offer menu-driven interfaces, but social-engineer-toolkit provides a more extensive range of attack options compared to xerosploit's focused network manipulation features.

16,239

The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.

Pros of bettercap

  • More actively maintained with frequent updates
  • Broader feature set, including WiFi and Bluetooth capabilities
  • Modular architecture allowing for easy extension

Cons of bettercap

  • Steeper learning curve due to more complex functionality
  • Requires more system resources to run effectively

Code comparison

xerosploit:

def get_gateway():
    gateway = check_output("route -n | grep 'UG[ \t]' | awk '{print $2}'", shell=True).decode().strip()
    return gateway

bettercap:

func FindGateway(iface *net.Interface) (*Endpoint, error) {
    ifName := iface.Name
    output, err := core.Exec("ip", []string{"route", "show", "dev", ifName})
    if err != nil {
        return nil, err
    }
    // ... (parsing logic)
}

Both tools aim to perform network attacks and reconnaissance, but bettercap offers a more comprehensive and modern approach. xerosploit is Python-based and focuses on simpler network manipulation, while bettercap is written in Go and provides a wider range of features. bettercap's modular design allows for greater flexibility, but it may be overwhelming for beginners. xerosploit is easier to use but has limited functionality compared to bettercap.

10,455

fsociety Hacking Tools Pack – A Penetration Testing Framework

Pros of fsociety

  • More comprehensive toolset with a wider range of functionalities
  • Active development and regular updates
  • Larger community and user base

Cons of fsociety

  • Potentially overwhelming for beginners due to the extensive feature set
  • May require more system resources due to its broader scope

Code Comparison

fsociety:

def menu():
    clearScr()
    print (logo + """
    [1] Information Gathering
    [2] Password Attacks
    [3] Wireless Testing
    [4] Exploitation Tools
    [5] Sniffing & Spoofing
    """)

xerosploit:

def menu():
    print("""
    [1] Network Mapping
    [2] ARP Poisoning
    [3] DNS Spoofing
    [4] Inject HTML
    [5] Sniff Traffic
    """)

The code comparison shows that fsociety offers a broader range of attack categories, while xerosploit focuses more on specific network-based attacks. This reflects the overall difference in scope between the two projects, with fsociety providing a more comprehensive toolkit and xerosploit concentrating on network exploitation techniques.

Exploitation Framework for Embedded Devices

Pros of RouterSploit

  • More comprehensive and focused on router exploitation
  • Actively maintained with regular updates
  • Larger community and contributor base

Cons of RouterSploit

  • Steeper learning curve for beginners
  • More complex setup and configuration

Code Comparison

RouterSploit:

from routersploit.core.exploit import *
from routersploit.core.http.http_client import HTTPClient

class Exploit(HTTPClient):
    __info__ = {
        "name": "Example Exploit",
        "description": "Example exploit description",
    }

Xerosploit:

import os
import sys
from time import sleep

def banner():
    print("\033[1;32m")
    print("XeroSploit v1.0")
    print("\033[1;m")

RouterSploit uses a more structured approach with classes and modules, while Xerosploit has a simpler, script-like structure. RouterSploit's code is more organized and follows object-oriented principles, making it easier to extend and maintain. Xerosploit's code is more straightforward but may be less flexible for complex scenarios.

RouterSploit is better suited for advanced users and security professionals focusing on router exploitation, while Xerosploit offers a simpler interface for general network attacks and may be more approachable for beginners. However, RouterSploit's active development and larger community make it a more robust and up-to-date option for those willing to invest time in learning its features.

The Rogue Access Point Framework

Pros of Wifiphisher

  • More actively maintained with regular updates
  • Supports a wider range of attack scenarios and phishing templates
  • Better documentation and community support

Cons of Wifiphisher

  • More complex setup and configuration required
  • Limited to Wi-Fi attacks, less versatile than Xerosploit
  • Requires specific wireless adapter compatibility

Code Comparison

Wifiphisher (Python):

def start(self):
    if not self.internet_info_manager.is_interface_valid():
        self.network_manager.set_interface_mode(self.interface, "managed")
    self.template.merge_interface_info(self.network_manager.get_interfaces())
    self.network_manager.start()

Xerosploit (Bash):

function xerosploit {
    clear
    echo -e "$red[+]$green Xerosploit Toolkit"
    echo -e "$red[+]$green Created by LionSec"
    echo -e "$red[+]$blue Select an option from menu:"
    echo -e "\t$red[1]$blue Scan Network"
    echo -e "\t$red[2]$blue ARP Spoofing"
}

Both tools focus on network attacks, but Wifiphisher is more specialized for Wi-Fi phishing, while Xerosploit offers a broader range of network exploitation features. Wifiphisher's code is more modular and object-oriented, while Xerosploit relies on shell scripting for its functionality.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Version PyPI Build AUR

Xerosploit

Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Powered by bettercap and nmap.

Dependencies

  • nmap
  • hping3
  • build-essential
  • ruby-dev
  • libpcap-dev
  • libgmp3-dev
  • tabulate
  • terminaltables

Instalation

Dependencies will be automatically installed.

git clone https://github.com/LionSec/xerosploit
cd xerosploit && sudo python install.py
sudo xerosploit

Tested on

Operative system Version
Ubuntu 16.04 / 15.10
Kali linux Rolling / Sana
Parrot OS 3.1

features

  • Port scanning
  • Network mapping
  • Dos attack
  • Html code injection
  • Javascript code injection
  • Download intercaption and replacement
  • Sniffing
  • Dns spoofing
  • Background audio reproduction
  • Images replacement
  • Drifnet
  • Webpage defacement and more ...

Demonstration

https://www.youtube.com/watch?v=35QUrtZEV9U

I have some questions!

Please visit https://github.com/LionSec/xerosploit/issues

Donations

Contact