HomeLinuxRoxysploit - A hackers framework

Roxysploit – A hackers framework

Roxysploit is an open-source community and a suite of penetration tests that supports attacks of many scenarios.

How to download and install the Roxysploit?

Step 1:

First of all, we need to download the Roxysploit tool so type the below command on your terminal.

				
					git clone https://github.com/andyvaikunth/roxysploit.git
				
			
Roxysploit – A hackers framework

Step 2:

Now change the directory to Roxysploit so run the below command

				
					cd roxysploit
				
			
Roxysploit – A hackers framework

Step 3:

Then permit to read write and execute of roxy.py python file and install bash scripts, so execute the below commands

				
					chmod +x install
chmod +x roxy.py
				
			
Roxysploit – A hackers framework

Step 4:

After that install and run the Roxysploit tool so run the following commands

				
					sudo /bin/bash install
pytrhon roxy.py
				
			
Roxysploit – A hackers framework

Options

A scan is an automated Information gathering plugin it gives the user the ability to have a rest while the best Information gathering plugin can be executed.

Jailpwn is a useful plugin for any iPhone device that has been jailbroken it will attempt to login to the ssh using its default password giving you a full shell.

Eternalblue is a recent plugin we added it Exploits a vulnerability on SMBv1/SMBv2 protocols these were collected from the NSA cyberweapons.

Internalroute Exploits multiple vulnerabilities in routers this can become very useful such as hotel wifi.

Aurora this is an old plugin that can become very useful for pen-testers it exploits Internet Explorer 6 URL vulnerability.

Doublepulsar is giving you the ability to Remotely inject a malicious DLL backdoor into a windows computer.

Kodi is a fantastic movie streaming platform but it runs on linux we have Created a malicious addon(backdoor) via kodi.tv

Bleed uses a mass vulnerability check on finding any SSL Vulnerabilities.

Trespass is a way of managing your php backdoor and gaining shell or even doing single commands it requires password authentication stopping any lurker.

A handler is commonly used to create a listener on a port.

Poppy is a MITM plugin allowing you to Arp spoof and sniffs unencrypted passwords on all protocols such as FTP and HTTP.

Redcarpet is a nice plugin keeping you safe from malicious hackers this will Encrypt a user directory.

Picklock is a local Bruteforce plugin that you can Picklock/Bruteforce Mulitple devices Pincodes such as android USB debugging.

Passby can load a USB to steal all credentials from a Windows computer in seconds.

Dnsspoof is common for man-in-the-middle attacks, it can redirect any HTTP requests to your DNS.

Smartremote is more of a funny remote exploit you can Take over a smart tv’s remote control without authentication.

Blueborne is a recent Bluetooth memory leak for all devices even cars.

Credswipe you have to have a card reader to clone them.

Rfpwn suitable device to brute force a special AM OOK or raw binary signal.

Ftpbrute Brute-force attack FTP(file transfer protocol) server Wifijammer you can Death wifi networks around your area, meaning disconnecting all users connected to the network.

RELATED ARTICLES

Leave A Reply

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular