cSploit is an open source (GPLed) Android network analysis and penetration suite which aims to be the most complete and advanced professional toolkit for IT security experts/geeks to perform network security assessments on a mobile device.
See more at www.cSploit.org.
- Map your local network
- Fingerprint hosts' operating systems and open ports
- Add your own hosts outside the local network
- Integrated traceroute
- Integrated Metasploit framework RPCd
- Search hosts for known vulnerabilities via integrated Metasploit daemon
- Adjust exploit settings, launch, and create shell consoles on exploited systems
- More coming
- Forge tcp/udp packets
- Perform man in the middle attacks (MITM) including:
- Image, text, and video replacement-- replace your own content on unencrypted web pages
- javascript injection-- add your own javascript to unencrypted web pages.
- password sniffing ( with common protocols dissection )
- Capture pcap network traffic files
- Real time traffic manipulation to replace images/text/inject into web pages
- DNS spoofing to redirect traffic to different domain
- Break existing connections
- Redirect traffic to another address
- Session Hijacking-- listen for unencrypted cookies and clone them to take Web session
- Use cSploit to get root shell on Metasploitable2
- Use cSploit for simple Man-in-the-Middle (MITM security demos
Also see the wiki for instructions on building, reporting issues, and more.
- A ROOTED device running Android 2.3 (Gingerbread) or newer
- The device must have a BusyBox full install, this means with every utility installed ( not the partial installation ). If you do not have busybox already, you can get it here or here (note cSploit does not endorse any busybox installer. These are just two we found).
The latest release and pre-release versions are available on github:
https://github.com/cSploit/android/releases
Or to save a click, this link should always point to the most recent release.
Additionally, you can get a fresh-from-the-source nightly at www.cSploit.org/downloads. These nightly builds are generated more frequently than the releases. And while they may have the very latest features, they may also have the latest bugs, so be careful running them!
All contributions are welcome, from code to documentation to graphics to design suggestions to bug reports. Please use github to its fullest-- contribute Pull Requests, contribute tutorials or other wiki content-- whatever you have to offer, we can use it!
This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
Copyleft Margaritelli of Simone aka evilsocket and then fused with zANTI2 continued by @tux-mind and additional contributors.
Note: cSploit is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts you own or have permission to test. Any other use is not the responsibility of the developer(s). Be sure that you understand and are complying with the cSploit licenses and laws in your area. In other words, don't be stupid, don't be an asshole, and use this tool responsibly and legally.