# CSharpXploit **Repository Path**: workingbird/csharp-xploit ## Basic Information - **Project Name**: CSharpXploit - **Description**: No description available - **Primary Language**: C# - **License**: GPL-2.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2025-01-17 - **Last Updated**: 2025-01-17 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Xploit Open source exploit framework made in C# # Youtube Sample Channel https://www.youtube.com/playlist?list=PLJWNXwuU6PvyAcNk8AtF8abbrz5-Sd2pR Xploit Wiki =================== Xploit opensource framework wiki written by **@alvarodh5** ---------- Commands ------------- Commands available in **v4.0.30319 version** **Help**: Displays a help text for the specified command, or displays a list of all available commands. > **Use:** >- Help command **Back**: Un-use the current module > **Use:** >- cd / >- cd.. / >- back **Banner**: Show a beautiful xploit banner > **Use:** >- banner >- ban (alias) **Beep**: Make a beep > **Use:** >- beep >- be (alias) **Check**: Check the current module > **Use:** >- check >- ch (alias) >**Example:** >> use Auxiliary/Multi/SSH/PortForwarding >>>Module(PortForwarding)> check >>>>[*] Its required to set the property Password (use set Password ) **Clear**: Clear console > **Use:** >- clear >- cls (alias) >- cle (alias) **Echo**: Print the input > **Use:** >- echo >- ec (alias) > **Example:** >> echo This is Xploit! >>>[*] This is Xploit! **Exit**: Exit xploit framework. > **Use:** >- exit >- quit (alias) **Exploit**: Run the current module > **Use:** >- exploit >- exp (alias) >- run >- rexploit >- rex (alias) >- rerun >- rer (alias) **Gset**: Set a global variable for the current module and the next call to this module > **Use:** >- gset [variable] [value] >- g [variable] [value] **Help**: Displays a help text for the specified command, or displays a list of all available commands. > **Use:** >- help >- man >- h (alias) >- m (alias) >- help [command] >- man [command] > **Example:** >> help echo >>>echo [input] >>>Print the input **Ifcheck**: Check the module, and if works, then run the command > **Use:** >- ifcheck [command] >- ifc (alias) **Ifnocheck**: Check the module, and if not works, then run the command > **Use:** >- ifnocheck [command] >- ifnoc (alias) **Ifrun**: Run the module, and if works, then run the command > **Use:** >- ifrun [command] >- ifr (alias) **Ifnorun**: Run the module, and if not works, then run the command > **Use:** >- ifnorun [command] >- ifnor (alias) **Info**: Show info of the current module > **Use:** >- info >- in (alias) > **Example:** >> info >>>Path Auxiliary/Multi/SSH >>>Name PortForwarding >>>Author Fernando Díaz Toledano >>>Description Port Forwarding from SSH machine **Jobs**: List all current jobs > **Use:** >- jobs >- j (alias) **Kill**: Kill the selected job > **Use:** >- kill [job] >- k (alias) **Load**: Load all modules from selected file > **Use:** >- load [file] >- l (alias) **Play**: Run the commands stored in a file > **Use:** >- play [file] >- p (alias) **Rcheck**: Reload the current module and check them > **Use:** >- rcheck >- rc (alias) **Record**: Start/Stop recording the input to a file > **Use:** >- record [options] >- rec (alias) > **Options:** >>- stop Stop the current record >>- [path] Start a record in this path > **Example:** >>- record C:\myrecords\xploit.txt >>>- record stop **Reload**: Reload the current module with the global variables > **Use:** >- reload >- rel (alias) **Search**: Search a module in the loaded modules > **Use:** >- search >- sea (alias) > **Example:** >>- search port >>>Auxiliary/Multi/SSH/PortForwarding >>>Auxiliary/Local/Server/SocksPortForwarding **Set**: Set a variable for the current module >- set > **Example:** >>set [variable] [value] **Show**: Show available information for the current module. >- config/options --> Displays the config for current module >- info --> Display info of the current module >- payloads --> Display available payloads for the current module >- targets --> Display available targets for the current module **Use**: Use a XPloit module >- use [module] >- u (alias) **Version**: Displays the current version of Xploit framework >- version >- v (alias) ---------- Xploits ------------------- Xploits available in **v4.0.30319 version** #### Auxiliary Complete list of all Auxiliaries modules: >- Auxiliary/Local/DatabaseQuery >>Execute a query in a Database >- Auxiliary/Local/DetectTorExitNode >>Check if a IP its a Tor exit node >- Auxiliary/Local/Exfiltration/DnsExfiltrate >>DNS-Exfiltration send >- Auxiliary/Local/Exfiltration/DnsExfiltrateParser >>DNS-Exfiltration file parser >- Auxiliary/Local/FileToHex >>Create a Hex string from file >- Auxiliary/Local/Fuzzing/PatternCreate >>Generate pattern string for exploit development >- Auxiliary/Local/Fuzzing/PatternSearch >>Search pattern string for exploit development >- Auxiliary/Local/Fuzzing/StreamFuzzer >>Generic Fuzzer >- Auxiliary/Local/NFC/MifareRestoreClone >>Mifare Restore clone (dont touch Trailing blocks) >- Auxiliary/Local/NFC/MifareSetId >>Mifare Id Setter. Require a valid card >- Auxiliary/Local/ProcessKill >>Kill a process in local machine >- Auxiliary/Local/ProcessMemoryDump >>Do a memory dump for the selected Process >- Auxiliary/Local/ProcessRun >>Execute a system command in local machine >- Auxiliary/Local/RSync >>Remote sync for folder >- Auxiliary/Local/Server/DnsServer >>DNS Server >- Auxiliary/Local/Server/SocksPortForwarding >>Invisible socks port forwarding >- Auxiliary/Local/Sniffer >>Local Sniffer >- Auxiliary/Local/Steganography/SteganographyImage >>Steganography by Image generator/parser (in PNG) >>Have two modes: >>> - Write: Destroy original message file >>> - Read : Read the image and write the secret file in LocalFileWrite >- Auxiliary/Local/TestPayload >>NFC Restore system >- Auxiliary/Local/Tor >>Tor Process >- Auxiliary/Local/Windows/BinaryFromScreen >> Binary from screen >- Auxiliary/Local/Windows/KeyDown >>Key down a textfile >- Auxiliary/Local/Windows/WMIManager >>WMI call >- Auxiliary/Local/WordListBruteForce >>Local Brute force by wordlist >- Auxiliary/Local/WordListGenerator >>Generate a wordList >- Auxiliary/Multi/SSH/DownloadFile >>Get a binay from SSH machine >- Auxiliary/Multi/SSH/FastExecution >>Execute SSH stream to exe machine >- Auxiliary/Multi/SSH/PortForwarding >>Port Forwarding from SSH machine #### Exploits Complete list of all exploits: >- Exploits/Multi/Netcat/PrintFormat >>Get a binay from SSH machine >- Exploits/Multi/VulnServer >>VulnServer exploit #### Payloads Complete list of all payloads: >- Payloads/Local/BruteForce/BruteForceBitLockerAPI >> Crack Bitlocker drive calling windows API >- Payloads/Local/BruteForce/BruteForceBi >> Crack Bitlocker drive >- Payloads/Local/BruteForce/BruteForceMySQLWireshark >>Crack MySql sniffed with WireShark Credentials >- Payloads/Local/BruteForce/NFC/BruteForceNFCMifare >>Mifare bruteforce >- Payloads/Local/Fuzzing/TcpSocketFuzzer >>Send fuzzer by TCP Socket >- Payloads/Local/RSync/Ftp >>Ftp rsync >- Payloads/Local/RSync/LocalPath >> Sync local path >- Payloads/Local/Sniffer/DeepScan >>Sniffer insecure protocols passwords >- Payloads/Local/Sniffer/DumpToFolder >>Sniffer to folder >- Payloads/Local/Sniffer/TcpPacketInjection >>Tcp Packet Injection >- Payloads/Local/Windows/WMI/Action/ExecuteProcess >>Execute a process in WMI >- Payloads/Local/Windows/WMI/Query/Auto >>Execute a default query in WMI >- Payloads/Local/Windows/WMI/Query/Manual >> Execute a default query in WMI >- Payloads/Multi/Windows/x86/PayloadX86WindowsMessageBox >>Show MessageBox