See more at www.cSploit.org.
Map your local network
Fingerprint hosts' operating systems and open ports
Add your own hosts outside the local network
Integrated Metasploit framework RPCd
Search hosts for known vulnerabilities via integrated Metasploit daemon
Adjust exploit settings, launch, and create shell consoles on exploited systems
Forge TCP/UDP packets
Perform man in the middle attacks (MITM) including:
Image, text, and video replacement-- replace your own content on unencrypted web pages
password sniffing ( with common protocols dissection )
Capture pcap network traffic files
Real time traffic manipulation to replace images/text/inject into web pages
DNS spoofing to redirect traffic to different domain
Break existing connections
Redirect traffic to another address
Session Hijacking-- listen for unencrypted cookies and clone them to take Web session
Although APK downloads are available below to give you the choice, you should be aware that by installing that way you will not receive update notifications and it's a less secure way to download. We recommend that you install the F-Droid client and use that.Download Store App
This version requires Android ? or newer.
It is built and signed by the original developer.
- android.permission.READ_EXTERNAL_STORAGE (?)