Top 15 cSploit Alternative and Similar Softwares | Dec 2024

The most complete and advanced IT security professional toolkit on Android.

- enumerate local hostsdone
- find vulnerabilitiesdone
- find exploits for these vulnerabilitiesdone
- use those exploits to gain access to the targetdone
- crack wifi passwords
- install backdoors for later access
- Portability: It can run on any UNIX-based system, but for now only Android is supported.

1. Pyrit

Pyrit Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock, it is currently by far the most powerful attack against one of the world’s most......

2. Android IMSI-Catcher Detector

Android IMSI-Catcher Detector AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike.......

3. FaceNiff

FaceNiff FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK)It's kind of like Firesheep for......

4. ApexSQL Audit

ApexSQL Audit ApexSQL Audit can audit all SQL Server activities such as data and objects access and changes, failed logins and security changes. It helps SQL DBAs to meet SQL Server audit compliance requirements by using many built-in audit reports. Use ApexSQL Audit to manage auditing across multiple SQL Server instances from......

5. victims

victims The victims project provides a canonical database of known-vulnerable JAR files, along with tools to compare this database to Java applications in development, release and production environments.......

6. KEEP PROTECT

KEEP PROTECT KEEP PROTECT is an automated vulnerabilities and security breaches detection platform for websites and web apps (XSS, SQL injection,etc).......

7. Intruder

Intruder Intruder is a proactive security monitoring platform for internet-facing systems.Cyber threats are ever-changing and require dedicated oversight. Existing services are inadequate, overly complex to configure and operate, and the jargon produced is often confusing, requiring specialist interpretation.Intruder provides a simple cloud based security solution which continually scans your digital assets,......

8. Dependency-Check

Dependency-Check Dependency-Check is a utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities. Currently Java and .NET dependencies are supported.......

9. Nikto

Nikto Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers.......

10. SolarWinds Log & Event Manager

SolarWinds Log & Event Manager SolarWinds Log & Event Manager delivers comprehensive SIEM and log management with real-time analysis, automated remediation, advanced search, and built-in reporting to simplify IT security, compliance, and operations in an all-in-one, affordable virtual appliance.Key Features:- Node based licensing- Real-time event correlation- Search log data- Real-time remediation- File integrity monitoring- High......

11. KeePassSD

KeePassSD This project hosts the Windows Mobile ports of the famous Windows PC application "KeePass - The Open-Source Password Safe" from Dominik Reichl ( http://keepass.sourceforge.net ). KeePassSD on KeePass V2.xx. If you synchronize your password database-file Dat*.kdbx with ActiveSync, you have the same passwords on your mobile device as on Vista......

12. GSMmap

GSMmap The GSM Security Map at gsmmap.org compares the protection capabilities of mobile networks. This app collects data and adds it to GSM Map.This application currently only works on Android 4.1.2 Samsung S2 and S3 devices and requires root priviliges during the mobile network data capture.Note: Custom Android systems like Cyanogenmod......

13. Lynis

Lynis Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!How it worksLynis......

14. Steganos Password Manager

Steganos Password Manager Do you leave your front door unlocked? Do you have the same key for your house, your car, and your office? Would you trust a complete stranger with your keys? Of course not!Passwords are the keys to your digital life, and the variety and quality of your personal passwords is......

15. SnoopSnitch

SnoopSnitch SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security......