dSploit

3
dSploit
Download
Category: Other (Network)
System: Android 2.3
Program Status: Free
Looking at the file: 6 364

Description

DSploit is an original application designed for smartphones that can easily identify network weaknesses.

About compatibility

The developers of the mobile application are focused on devices running on Android OS (initial version from 2.3 and up to 5.0).

More about the features

The main task is to search for imperfections in the hotspot. The application facilitates traffic tracking, identifying those who connected to Wi-Fi on an illegal basis. In this case, it is supposed to redirect traffic to a certain resource, generate passwords to closed hotspots by using dictionaries. In addition, dSploit conducts intermediary attacks by replacing messages sent by users, of which users remain completely unaware. Hacked routers with simple passwords, as well as MITM attacks, of course, will remain on the conscience of the people who perpetrated them. The creators will not be held responsible for these steps.

Features

The functioning of the application assumes that there are superuser rights. Running the program will not happen if you do not take care of obtaining Root access. In other words, you need to use applications similar to DingDongRoot, 360 Root it should be emphasized that dSploit is being tested today. Consequently, users will certainly encounter bugs. Undoubtedly, the problems will be fixed in time. However, it will not happen as soon as everyone would like. Developers' thoughts about the project zANTI , which has gained great popularity, its options are similar to dSploit's functionality, but its capabilities have been significantly improved.

What's most important

The key features of dSploit are as follows:
  1. Vulnerabilities in the access point are identified without much difficulty.
  2. Suspicious connections are quickly detected.
  3. Transmitted traffic is monitored.
  4. Functioning is possible only on devices with Root.
  5. Uncomplicated passwords are simply cracked.
  6. MITM attacks are performed.
  7. Working with HTTP redirects is allowed.
  8. The application exists only in test format, and its development has been temporarily suspended for the time being.
Screenshots

See also:

Furby BOOM Furby BOOM
Furby BOOM is a fully entertaining segment of apps that is very similar to those Tamagotchis that...
VibranceGUI VibranceGUI
VibranceGUI is a software that can be used to adjust the color saturation both in the operating...
Trust VPN Trust VPN
Trust VPN utility for Android mobile devices is used to connect to a virtual private network. It...
Coursera Coursera
Coursera is a mobile utility that gives you access to an extensive collection of training courses....
SAS Planet SAS Planet
SAS Planet is a Windows utility that provides the ability to download and view a variety of world...
MDF to ISO MDF to ISO
MDF to ISO is a narrowly focused utility designed for PCs and laptops running Windows 10 or newer....
XMind XMind
XMind is a program designed to visualize information. It can be used to create mental maps based on...
Opera Mini Opera Mini
Opera Mini (Opera Mini) is one of the many variations of Opera, according to most users, one of the...
Comments (0)
Commenting
Comment