Home Sniffing & Spoofing Xerosploit – Pentesting Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD...

Xerosploit – Pentesting Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks

Xerosploit – Pentesting Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks

Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.

We can use this tool to perform DOS, MITM attacks, also the tool has driftnet modules which capture images and also it will be used in performing Injection attacks. It was Committed by LionSec1, it is a powerful and simple to use the tool.

Also Read: Master in Ethical Hacking & Penetration Testing Online – Scratch to Advance Level

Tool Dependencies

  • nmap
  • hping3
  • build-essential
  • ruby-dev
  • libpcap-dev
  • libgmp3-dev
  • tabulate
  • terminaltables

Tool Features

  • Port scanning
  • Network mapping
  • Dos attack
  • Html code injection
  • Javascript code injection
  • Download interception and replacement
  • Sniffing
  • DNS spoofing
  • Background audio reproduction
  • Images replacement
  • Drifnet
  • Webpage defacement and more.

Kali Linux Tutorial – Xerosploit

To clone Xerosploit git clone https://github.com/LionSec/xerosploit and to run installation sudo python install.py

Need to select your operating system and to launch type Xerosploit.

Just need to type help to view all the commands.

First, we need to scan the network to map all the devices. Xero  scan

Then select the target IP address and type help.

You can select any Module to attack, let’s we start with port scanner pscan.

Next, we go on try launching a Dos attack, for examining packets we have configured Wireshark in the recipient system.

Type back to go the main menu and then dos >> run to perform the attack.

Now let’s try sniffing the images what your friend seeing in his computer.

Once the attack launched we can sniff down all the images that he is viewing on his computer in our screen.

We can do much more with this tool simply by using the move you can shake the browser contents and with Yplay you can make audios to play in the background.


DownloadFree GDPR Comics Book – Importance of Following General Data Protection Regulation (GDPR) to protect your Company Data and user privacy

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.


This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

Guru is an Ex-Security Engineer at Comodo Cybersecurity. Co-Founder - Cyber Security News & GBHackers On Security.


Please enter your comment!
Please enter your name here