cSploit – WiFi Exploit (dSploit & zAnti Killer) APK is Here !
The most complete and advanced IT security professional toolkit on Android. Thanks to the new core, cSploit will be easily portable.
Basically it can run on any UNIX-based system, but for now only Andorid is supported. When Developer reach a beta-state version he will consider working on iOS, OSX, GTK+ and QT.
Story Behind The Birth of cSploit
After being initially created by evilsocket, Tux-mind started working on dSploit in summer 2012, Tux-mind forked it and added the following features
Direct Download Link
- Vulnerability finder
- Exploit finder
- MetaSploitFramework integration ( draft )
After some weeks the project owner ( evilsocket ) asked him to merge it to the upstream branch. Initially there were about 2 main developers (Tux-mind and evilsocket) and an UI developer ( androguide ). After a few months evilsocket got overloaded by work and stop working on it.
But Tux-mind kept working on dSploit, always trying to improve it. Many functions were slow and error-prone, Tux-mind changed the way them work, added new features and corrected many bugs.
Finally, in summer 2014 Tux-mind suggested a new way to make dSploit work, the new core. basically Tux-mind wish to move all the slow and inefficent code out of Java. Evilsocket agreed with Tux-mind’s suggestion and told Tux-mind to start working on it. Evilsocket is very busy with work because he started working for zImpremium.
On autumn 2014 evilsocket received the order to merge dSploit into zANTI2. this decision killed the project. Tux-mind asked if he could bring it on, but evilsocket told that the domain dsploit.net belongs to him and dsploit will officially merge into zANTI2. So Tux-mind forked the project and finished his work on the new core.
This was when cSploit was born.
Final Goal Features of cSploit
- Crack wifi passwords (Not implemented yet)
- Enumerate local hosts
- Find vulnerabilities
- Find exploits for these vulnerabilities
- Use those exploits to gain access to the target
- Install backdoors for later access
- Daemon will not die with the app
- Fixed network-radar search algorithm
- Use listener instead of Intent for targets, they are too slow.
Sharing is Caring
This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.