Skip to content
Alvaro Diaz edited this page Mar 21, 2017 · 1 revision

Welcome to the Xploit wiki!

Xploit opensource framework wiki written by @alvarodh5


Commands

Commands available in v4.0.30319 version

Help: Displays a help text for the specified command, or displays a list of all available commands.

Use:

  • Help command

Back: Un-use the current module

Use:

  • cd /
  • cd.. /
  • back

Banner: Show a beautiful xploit banner

Use:

  • banner
  • ban (alias)

Beep: Make a beep

Use:

  • beep
  • be (alias)

Check: Check the current module

Use:

  • check
  • ch (alias)

Example:

use Auxiliary/Multi/SSH/PortForwarding

Module(PortForwarding)> check

[*] Its required to set the property Password (use set Password )

Clear: Clear console

Use:

  • clear
  • cls (alias)
  • cle (alias)

Echo: Print the input

Use:

  • echo
  • ec (alias)

Example:

echo This is Xploit!

[*] This is Xploit!

Exit: Exit xploit framework.

Use:

  • exit
  • quit (alias)

Exploit: Run the current module

Use:

  • exploit
  • exp (alias)
  • run
  • rexploit
  • rex (alias)
  • rerun
  • rer (alias)

Gset: Set a global variable for the current module and the next call to this module

Use:

  • gset [variable] [value]
  • g [variable] [value]

Help: Displays a help text for the specified command, or displays a list of all available commands.

Use:

  • help
  • man
  • h (alias)
  • m (alias)
  • help [command]
  • man [command]

Example:

help echo

echo [input] Print the input

Ifcheck: Check the module, and if works, then run the command

Use:

  • ifcheck [command]
  • ifc (alias)

Ifnocheck: Check the module, and if not works, then run the command

Use:

  • ifnocheck [command]
  • ifnoc (alias)

Ifrun: Run the module, and if works, then run the command

Use:

  • ifrun [command]
  • ifr (alias)

Ifnorun: Run the module, and if not works, then run the command

Use:

  • ifnorun [command]
  • ifnor (alias)

Info: Show info of the current module

Use:

  • info
  • in (alias)

Example:

info

Path Auxiliary/Multi/SSH Name PortForwarding Author Fernando Díaz Toledano Description Port Forwarding from SSH machine

Jobs: List all current jobs

Use:

  • jobs
  • j (alias)

Kill: Kill the selected job

Use:

  • kill [job]
  • k (alias)

Load: Load all modules from selected file

Use:

  • load [file]
  • l (alias)

Play: Run the commands stored in a file

Use:

  • play [file]
  • p (alias)

Rcheck: Reload the current module and check them

Use:

  • rcheck
  • rc (alias)

Record: Start/Stop recording the input to a file

Use:

  • record [options]
  • rec (alias)

Options:

  • stop Stop the current record
  • [path] Start a record in this path

Example:

  • record C:\myrecords\xploit.txt
  • record stop

Reload: Reload the current module with the global variables

Use:

  • reload
  • rel (alias)

Search: Search a module in the loaded modules

Use:

  • search
  • sea (alias)

Example:

  • search port

Auxiliary/Multi/SSH/PortForwarding Auxiliary/Local/Server/SocksPortForwarding

Set: Set a variable for the current module

  • set

Example:

set [variable] [value]

Show: Show available information for the current module.

  • config/options --> Displays the config for current module
  • info --> Display info of the current module
  • payloads --> Display available payloads for the current module
  • targets --> Display available targets for the current module

Use: Use a XPloit module

  • use [module]
  • u (alias)

Version: Displays the current version of Xploit framework

  • version
  • v (alias)

Xploits

Xploits available in v4.0.30319 version

Auxiliary

Complete list of all Auxiliaries modules:

  • Auxiliary/Local/DatabaseQuery

Execute a query in a Database

  • Auxiliary/Local/DetectTorExitNode

Check if a IP its a Tor exit node

  • Auxiliary/Local/Exfiltration/DnsExfiltrate

DNS-Exfiltration send

  • Auxiliary/Local/Exfiltration/DnsExfiltrateParser

DNS-Exfiltration file parser

  • Auxiliary/Local/FileToHex

Create a Hex string from file

  • Auxiliary/Local/Fuzzing/PatternCreate

Generate pattern string for exploit development

  • Auxiliary/Local/Fuzzing/PatternSearch

Search pattern string for exploit development

  • Auxiliary/Local/Fuzzing/StreamFuzzer

Generic Fuzzer

  • Auxiliary/Local/NFC/MifareRestoreClone

Mifare Restore clone (dont touch Trailing blocks)

  • Auxiliary/Local/NFC/MifareSetId

Mifare Id Setter. Require a valid card

  • Auxiliary/Local/ProcessKill

Kill a process in local machine

  • Auxiliary/Local/ProcessMemoryDump

Do a memory dump for the selected Process

  • Auxiliary/Local/ProcessRun

Execute a system command in local machine

  • Auxiliary/Local/RSync

Remote sync for folder

  • Auxiliary/Local/Server/DnsServer

DNS Server

  • Auxiliary/Local/Server/SocksPortForwarding

Invisible socks port forwarding

  • Auxiliary/Local/Sniffer

Local Sniffer

  • Auxiliary/Local/Steganography/SteganographyImage

Steganography by Image generator/parser (in PNG) Have two modes:

         - Write: Destroy original message file
         - Read : Read the image and write the secret file in LocalFileWrite
  • Auxiliary/Local/TestPayload

NFC Restore system

  • Auxiliary/Local/Tor

Tor Process

  • Auxiliary/Local/Windows/BinaryFromScreen

Binary from screen

  • Auxiliary/Local/Windows/KeyDown

Key down a textfile

  • Auxiliary/Local/Windows/WMIManager

WMI call

  • Auxiliary/Local/WordListBruteForce

Local Brute force by wordlist

  • Auxiliary/Local/WordListGenerator

Generate a wordList

  • Auxiliary/Multi/SSH/DownloadFile

Get a binay from SSH machine

  • Auxiliary/Multi/SSH/FastExecution

Execute SSH stream to exe machine

  • Auxiliary/Multi/SSH/PortForwarding

Port Forwarding from SSH machine

Exploits

Complete list of all exploits:

  • Exploits/Multi/Netcat/PrintFormat

Get a binay from SSH machine

  • Exploits/Multi/VulnServer

VulnServer exploit

Payloads

Complete list of all payloads:

  • Payloads/Local/BruteForce/BruteForceBitLockerAPI

Crack Bitlocker drive calling windows API

  • Payloads/Local/BruteForce/BruteForceBi

Crack Bitlocker drive

  • Payloads/Local/BruteForce/BruteForceMySQLWireshark

Crack MySql sniffed with WireShark Credentials

  • Payloads/Local/BruteForce/NFC/BruteForceNFCMifare

Mifare bruteforce

  • Payloads/Local/Fuzzing/TcpSocketFuzzer

Send fuzzer by TCP Socket

  • Payloads/Local/RSync/Ftp

Ftp rsync

  • Payloads/Local/RSync/LocalPath

Sync local path

  • Payloads/Local/Sniffer/DeepScan

Sniffer insecure protocols passwords

  • Payloads/Local/Sniffer/DumpToFolder

Sniffer to folder

  • Payloads/Local/Sniffer/TcpPacketInjection

Tcp Packet Injection

  • Payloads/Local/Windows/WMI/Action/ExecuteProcess

Execute a process in WMI

  • Payloads/Local/Windows/WMI/Query/Auto

Execute a default query in WMI

  • Payloads/Local/Windows/WMI/Query/Manual

Execute a default query in WMI

  • Payloads/Multi/Windows/x86/PayloadX86WindowsMessageBox

Show MessageBox

Clone this wiki locally