Darksplitz : Exploit Framework

Darksplitz is a exploit framework tool that is continued from Nefix, DirsPy and Xmasspy project.

Installation

Will work fine in the debian shade operating system, like Backbox, Ubuntu or Kali linux.

$ git clone https://github.com/koboi137/darksplitz
$ cd darksplitz/
$ sudo ./install.sh

Also Read – Evillimiter : Tool that Limits Bandwidth of Devices on the Same Network Without Access

Features

  • Extract mikrotik credential (user.dat)
  • Password generator
  • Reverse IP lookup
  • Mac address sniffer
  • Online md5 cracker
  • Mac address lookup
  • Collecting url from web.archive.org
  • Web backdoor (Dark Shell)
  • Winbox exploit (CVE-2018-14847)
  • ChimeyRed exploit for mipsbe (Mikrotik)
  • Exploit web application
  • Mass apple dos (CVE-2018-4407)
  • Libssh exploit (CVE-2018-10933)
  • Discovering Mikrotik device
  • Directory scanner
  • Subdomain scanner
  • Mac address scanner
  • Mac address pinger
  • Vhost scanner (bypass cloudflare)
  • Mass bruteforce (wordpress)
  • Interactive msfrpc client

Exploit Web Application

  • plUpload file upload
  • jQuery file upload (CVE-2018-9206)
  • Laravel (.env)
  • sftp-config.json (misc)
  • WordPress register (enable)
  • elfinder file upload
  • Drupal 7 exploit (CVE-2018-7600)
  • Drupal 8 exploit (CVE-2018-7600)
  • com_fabrik exploit (joomla)
  • gravityform plugin file upload (wordpress)
  • geoplace3 plugin file upload (wordpress)
  • peugeot-music plugin file upload (wordpress)

Notes

This tool will work fine under root, because scapy module and other need root user to access more features. But you can run as user too in some features.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

3 days ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago