# CSharpXploit
**Repository Path**: workingbird/csharp-xploit
## Basic Information
- **Project Name**: CSharpXploit
- **Description**: No description available
- **Primary Language**: C#
- **License**: GPL-2.0
- **Default Branch**: master
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2025-01-17
- **Last Updated**: 2025-01-17
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# Xploit
Open source exploit framework made in C#
# Youtube Sample Channel
https://www.youtube.com/playlist?list=PLJWNXwuU6PvyAcNk8AtF8abbrz5-Sd2pR
Xploit Wiki
===================
Xploit opensource framework wiki written by **@alvarodh5**
----------
Commands
-------------
Commands available in **v4.0.30319 version**
**Help**: Displays a help text for the specified command, or displays a list of all available commands.
> **Use:**
>- Help command
**Back**: Un-use the current module
> **Use:**
>- cd /
>- cd.. /
>- back
**Banner**: Show a beautiful xploit banner
> **Use:**
>- banner
>- ban (alias)
**Beep**: Make a beep
> **Use:**
>- beep
>- be (alias)
**Check**: Check the current module
> **Use:**
>- check
>- ch (alias)
>**Example:**
>> use Auxiliary/Multi/SSH/PortForwarding
>>>Module(PortForwarding)> check
>>>>[*] Its required to set the property Password (use set Password )
**Clear**: Clear console
> **Use:**
>- clear
>- cls (alias)
>- cle (alias)
**Echo**: Print the input
> **Use:**
>- echo
>- ec (alias)
> **Example:**
>> echo This is Xploit!
>>>[*] This is Xploit!
**Exit**: Exit xploit framework.
> **Use:**
>- exit
>- quit (alias)
**Exploit**: Run the current module
> **Use:**
>- exploit
>- exp (alias)
>- run
>- rexploit
>- rex (alias)
>- rerun
>- rer (alias)
**Gset**: Set a global variable for the current module and the next call to this module
> **Use:**
>- gset [variable] [value]
>- g [variable] [value]
**Help**: Displays a help text for the specified command, or displays a list of all available commands.
> **Use:**
>- help
>- man
>- h (alias)
>- m (alias)
>- help [command]
>- man [command]
> **Example:**
>> help echo
>>>echo [input]
>>>Print the input
**Ifcheck**: Check the module, and if works, then run the command
> **Use:**
>- ifcheck [command]
>- ifc (alias)
**Ifnocheck**: Check the module, and if not works, then run the command
> **Use:**
>- ifnocheck [command]
>- ifnoc (alias)
**Ifrun**: Run the module, and if works, then run the command
> **Use:**
>- ifrun [command]
>- ifr (alias)
**Ifnorun**: Run the module, and if not works, then run the command
> **Use:**
>- ifnorun [command]
>- ifnor (alias)
**Info**: Show info of the current module
> **Use:**
>- info
>- in (alias)
> **Example:**
>> info
>>>Path Auxiliary/Multi/SSH
>>>Name PortForwarding
>>>Author Fernando Díaz Toledano
>>>Description Port Forwarding from SSH machine
**Jobs**: List all current jobs
> **Use:**
>- jobs
>- j (alias)
**Kill**: Kill the selected job
> **Use:**
>- kill [job]
>- k (alias)
**Load**: Load all modules from selected file
> **Use:**
>- load [file]
>- l (alias)
**Play**: Run the commands stored in a file
> **Use:**
>- play [file]
>- p (alias)
**Rcheck**: Reload the current module and check them
> **Use:**
>- rcheck
>- rc (alias)
**Record**: Start/Stop recording the input to a file
> **Use:**
>- record [options]
>- rec (alias)
> **Options:**
>>- stop Stop the current record
>>- [path] Start a record in this path
> **Example:**
>>- record C:\myrecords\xploit.txt
>>>- record stop
**Reload**: Reload the current module with the global variables
> **Use:**
>- reload
>- rel (alias)
**Search**: Search a module in the loaded modules
> **Use:**
>- search
>- sea (alias)
> **Example:**
>>- search port
>>>Auxiliary/Multi/SSH/PortForwarding
>>>Auxiliary/Local/Server/SocksPortForwarding
**Set**: Set a variable for the current module
>- set
> **Example:**
>>set [variable] [value]
**Show**: Show available information for the current module.
>- config/options --> Displays the config for current module
>- info --> Display info of the current module
>- payloads --> Display available payloads for the current module
>- targets --> Display available targets for the current module
**Use**: Use a XPloit module
>- use [module]
>- u (alias)
**Version**: Displays the current version of Xploit framework
>- version
>- v (alias)
----------
Xploits
-------------------
Xploits available in **v4.0.30319 version**
#### Auxiliary
Complete list of all Auxiliaries modules:
>- Auxiliary/Local/DatabaseQuery
>>Execute a query in a Database
>- Auxiliary/Local/DetectTorExitNode
>>Check if a IP its a Tor exit node
>- Auxiliary/Local/Exfiltration/DnsExfiltrate
>>DNS-Exfiltration send
>- Auxiliary/Local/Exfiltration/DnsExfiltrateParser
>>DNS-Exfiltration file parser
>- Auxiliary/Local/FileToHex
>>Create a Hex string from file
>- Auxiliary/Local/Fuzzing/PatternCreate
>>Generate pattern string for exploit development
>- Auxiliary/Local/Fuzzing/PatternSearch
>>Search pattern string for exploit development
>- Auxiliary/Local/Fuzzing/StreamFuzzer
>>Generic Fuzzer
>- Auxiliary/Local/NFC/MifareRestoreClone
>>Mifare Restore clone (dont touch Trailing blocks)
>- Auxiliary/Local/NFC/MifareSetId
>>Mifare Id Setter. Require a valid card
>- Auxiliary/Local/ProcessKill
>>Kill a process in local machine
>- Auxiliary/Local/ProcessMemoryDump
>>Do a memory dump for the selected Process
>- Auxiliary/Local/ProcessRun
>>Execute a system command in local machine
>- Auxiliary/Local/RSync
>>Remote sync for folder
>- Auxiliary/Local/Server/DnsServer
>>DNS Server
>- Auxiliary/Local/Server/SocksPortForwarding
>>Invisible socks port forwarding
>- Auxiliary/Local/Sniffer
>>Local Sniffer
>- Auxiliary/Local/Steganography/SteganographyImage
>>Steganography by Image generator/parser (in PNG)
>>Have two modes:
>>> - Write: Destroy original message file
>>> - Read : Read the image and write the secret file in LocalFileWrite
>- Auxiliary/Local/TestPayload
>>NFC Restore system
>- Auxiliary/Local/Tor
>>Tor Process
>- Auxiliary/Local/Windows/BinaryFromScreen
>> Binary from screen
>- Auxiliary/Local/Windows/KeyDown
>>Key down a textfile
>- Auxiliary/Local/Windows/WMIManager
>>WMI call
>- Auxiliary/Local/WordListBruteForce
>>Local Brute force by wordlist
>- Auxiliary/Local/WordListGenerator
>>Generate a wordList
>- Auxiliary/Multi/SSH/DownloadFile
>>Get a binay from SSH machine
>- Auxiliary/Multi/SSH/FastExecution
>>Execute SSH stream to exe machine
>- Auxiliary/Multi/SSH/PortForwarding
>>Port Forwarding from SSH machine
#### Exploits
Complete list of all exploits:
>- Exploits/Multi/Netcat/PrintFormat
>>Get a binay from SSH machine
>- Exploits/Multi/VulnServer
>>VulnServer exploit
#### Payloads
Complete list of all payloads:
>- Payloads/Local/BruteForce/BruteForceBitLockerAPI
>> Crack Bitlocker drive calling windows API
>- Payloads/Local/BruteForce/BruteForceBi
>> Crack Bitlocker drive
>- Payloads/Local/BruteForce/BruteForceMySQLWireshark
>>Crack MySql sniffed with WireShark Credentials
>- Payloads/Local/BruteForce/NFC/BruteForceNFCMifare
>>Mifare bruteforce
>- Payloads/Local/Fuzzing/TcpSocketFuzzer
>>Send fuzzer by TCP Socket
>- Payloads/Local/RSync/Ftp
>>Ftp rsync
>- Payloads/Local/RSync/LocalPath
>> Sync local path
>- Payloads/Local/Sniffer/DeepScan
>>Sniffer insecure protocols passwords
>- Payloads/Local/Sniffer/DumpToFolder
>>Sniffer to folder
>- Payloads/Local/Sniffer/TcpPacketInjection
>>Tcp Packet Injection
>- Payloads/Local/Windows/WMI/Action/ExecuteProcess
>>Execute a process in WMI
>- Payloads/Local/Windows/WMI/Query/Auto
>>Execute a default query in WMI
>- Payloads/Local/Windows/WMI/Query/Manual
>> Execute a default query in WMI
>- Payloads/Multi/Windows/x86/PayloadX86WindowsMessageBox
>>Show MessageBox