dSploit

3
dSploit
Download
Category: Other (Network)
System: Android 2.3
Program Status: Free
Looking at the file: 6 365

Description

DSploit is an original application designed for smartphones that can easily identify network weaknesses.

About compatibility

The developers of the mobile application are focused on devices running on Android OS (initial version from 2.3 and up to 5.0).

More about the features

The main task is to search for imperfections in the hotspot. The application facilitates traffic tracking, identifying those who connected to Wi-Fi on an illegal basis. In this case, it is supposed to redirect traffic to a certain resource, generate passwords to closed hotspots by using dictionaries. In addition, dSploit conducts intermediary attacks by replacing messages sent by users, of which users remain completely unaware. Hacked routers with simple passwords, as well as MITM attacks, of course, will remain on the conscience of the people who perpetrated them. The creators will not be held responsible for these steps.

Features

The functioning of the application assumes that there are superuser rights. Running the program will not happen if you do not take care of obtaining Root access. In other words, you need to use applications similar to DingDongRoot, 360 Root it should be emphasized that dSploit is being tested today. Consequently, users will certainly encounter bugs. Undoubtedly, the problems will be fixed in time. However, it will not happen as soon as everyone would like. Developers' thoughts about the project zANTI , which has gained great popularity, its options are similar to dSploit's functionality, but its capabilities have been significantly improved.

What's most important

The key features of dSploit are as follows:
  1. Vulnerabilities in the access point are identified without much difficulty.
  2. Suspicious connections are quickly detected.
  3. Transmitted traffic is monitored.
  4. Functioning is possible only on devices with Root.
  5. Uncomplicated passwords are simply cracked.
  6. MITM attacks are performed.
  7. Working with HTTP redirects is allowed.
  8. The application exists only in test format, and its development has been temporarily suspended for the time being.
Screenshots

See also:

iCloud Activation Bypass Tool 1.0.0 iCloud Activation Bypass Tool 1.0.0
The iCloud Activation Bypass Tool application allows you to unlock Apple-branded devices. A common...
EasyDiag EasyDiag
Easi-Diag is an application for devices based on "android system", thanks to which you can monitor...
KiTTY KiTTY
KiTTY - today is a Telnet/SSH client, which is an improvement of a program known to many people,...
Opera Opera
Opera - this browser has been on the market for quite a long time and is not leaving the position...
CrazyTalk CrazyTalk
CrazyTalk - the presented program helps the user to animate photos on Windows. With its help, you...
Moo.do Moo.do
The purpose of Moo.do utility is to organize your to-do list and create notes. It does not need to...
NGL NGL
NGL is an Android utility that allows you to anonymously communicate with your followers on...
vcomp110 dll vcomp110 dll
The vcomp110.dll file is a dynamically linked library for Windows. It is a part of Visual Studio...
Comments (0)
Commenting
Comment