Skip to content

Latest commit

 

History

History
40 lines (20 loc) · 2.92 KB

README.md

File metadata and controls

40 lines (20 loc) · 2.92 KB

Actively Maintained Version License Language

K-Sploit

🕵🔎 By KaotickJ 👽

Logo

Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit simplifies repetitive metasploit functions such as generating payloads, deploying listeners, and injecting msf payloads into Windows exectuables. Requires metasploit framework https://github.com/rapid7/metasploit-framework

For complete documentation see KSploit Wiki

KSploit Usage Demo Video:

KSploit Usage Demo

Exploits, payloads, listeners for:

🖥Windows 🐧 Linux 🍎 Mac 🤖 Android

Listeners:

Use the listeners menu to craft and quickly deploy metasploit listeners. Choose from Windows x86/x64, Linux x86/x64, Mac/OSX, and Android listeners.

Payloads

Use the payloads menu to quickly and easily craft metasploit payloads for a wide variety of targets. Payload options for windows x86/x64, linux x86/x64, mac/osx, android, and python.

Windows Executable Payload Injection:

Use the windows executable injection menu to inject metasploit payloads into windows executables.

Disclaimer

The KSploit script is a tool intended for legitimate penetration testing and security research purposes only. It should only be used with explicit permission and in accordance with all applicable laws and regulations. The ability to generate malicious payloads and shell scripts raises significant ethical and legal concerns. Users of this tool are solely responsible for ensuring their actions are authorized and lawful.

Under no circumstances should this script be used to gain unauthorized access to systems, disrupt operations, or conduct any other malicious activities. The author and distributors of this tool will not be held liable for any misuse or damages resulting from its use.

It is the user's responsibility to only utilize KSploit within the scope of their authorized testing activities, to respect the privacy and security of all parties involved, and to discontinue use if concerns arise about the legality or ethics of their actions. Improper or illegal use of this tool may result in severe civil and criminal penalties.