Skip to content

intSpLoiT/intframework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

intSpLoiT Framework

intSpLoiT Framework

Supported OS License Version Python Exploits Post Exploits Auxiliary Modules Encoders Payloads OSINT Modules

We are currently editing this repository! Stay tuned for updates.
Other update comming on 20.08.2025


🧠 Why Choose intSpLoiT?

intSpLoiT is a modular penetration testing framework with over 800+ modules including exploits, post-exploitation, OSINT tools, and payloads.
It is designed for security researchers, red teams, and ethical hackers who need flexibility, power, and scalability.


💡 Interested in developing the framework core? See CORE_DEVELOPERS.md 💬 Discord: velgrath_

🚀 Features

Wide Module Support – Over 800+ modules, including OSINT,exploits,auxiliary,encoders, ...
Advanced Exploitation – 500+ exploits (aiming for 2500
Post-Exploitation Tools – 120+ post-exploit modules (targeting 500+) for persistence and privilege escalation
Auxiliary Modules – 108 supporting tools, with a goal to expand to 1250
OSINT-Specific Modules – 50+ tools for open-source intelligence gathering
Payload Generation – 8+ payloads with encoding support (50 encoders)
Multi-Platform Support – Works on Termux, Kali Linux, and Debian-based systems
Interactive Shell – Real-time command execution with a powerful shell


🔮 Future Roadmap

🚧 Expanding Exploit Library – Increasing to 2500+ exploits and 500+ post-exploit modules
🚧 More Auxiliary Tools – Targeting 1250+ auxiliary modules
🚧 Advanced OSINT Capabilities – Enhancing OSINT modules beyond 200+
🚧 Cloud-Based Modules – Remote exploitation capabilities
🚧 Mobile Device Support – Dedicated Android & iOS modules
🚧 Self-Updating Framework – Automatic module and exploit updates
🚧 Real-Time Attack Analysis – In-depth monitoring of active exploits
🚧 More Commands – want to you are use other commands


⚠️ Disclaimer

intSpLoiT and its developers disclaim any responsibility or liability for improper use of this framework.


⚙️ Installation Guide

Before Running the Framework:

Ensure that all dependencies are installed properly.

1️⃣ After executing terbuild.sh

source ~/.bashrc

2️⃣ If intframework is located under /usr/opt

cd $PREFIX/opt/ mkdir -p intframework mv $PREFIX/opt/* $PREFIX/opt/intframework

3️⃣ Before running intconsole

cd $INTFRAMEWORK_PATH mv inttable/inttable $PREFIX/lib/python3.12/

4️⃣ Using inttable module in Python

import inttable.inttable as inttable inttable.core.activate("root") inttable.console.run("command")

📷 Screenshots

System Interface: system photos: İntikam21 photos:

More UI Previews:

Photo2 Github Badge


📲 Installing on Termux

apt update && apt upgrade pkg update && pkg upgrade pkg install python3 pkg install git pip3 install requests git clone https://github.com/intSpLoiT/intframework cd intframework chmod +x terbuild.sh ./terbuild.sh

🔍 Usage Examples

in the console

int4-pro > use modules/Auxiliary/social/userscan.py int4-pro userscan.py(modules/Auxiliary/social/userscan.py) > run <example --lang en> not rooted [*] Inspecting module: modules/Auxiliary/social/userscan.py [+] Module inspection complete. [*] Running module: modules/Auxiliary/social/userscan.py [>] Command: python3 modules/Auxiliary/social/userscan.py example --lang en [+] Find Profile by Username [+] [+] Username found on: github [+] Profile URL: https://api.github.com/users/example/events/public --------------------------------------------------------------------------- [+] Username found on: github [+] Profile URL: https://api.github.com/users/example --------------------------------------------------------------------------- [+] Username found on: twitter [+] Profile URL: https://twitter.com/example --------------------------------------------------------------------------- ^C [!] Error during module execution: module 'inttable' has no attribute 'write' int4-pro userscan.py(modules/Auxiliary/social/userscan.py) >

in Modular

1️⃣ Running a Network Scan Module

int4 (modular) > use network_scan [*] Module selected: network_scan int4 module(network_scan) > show options [*] Available options for module: network_scan fs: None timeout: None int4 module(network_scan) > set timeout 0.1 [*] timeout = 0.1 int4 module(network_scan) > run 

Example Output:

Network Scanner IP Address | Device Name | Status --------------------------------------------- 192.168.5.1 | Network Scan | Port Active, Ping Active, HTTP Active 192.168.5.3 | Unknown Device | Inactive 192.168.5.8 | Unknown Device | Inactive 

in Exploiter

2️⃣ Using inthandler for Exploitation

int4 (exploiter) > use multi/handler Exploit 'multi/handler' selected. int4 exploit(multi/handler) > run python: can't open file '/storage/emulated/0/intframework/modules/exploits/multi.handler': [Errno 2] No such file or directory int4 exploit(multi/handler) > set FILENAME multi/handler/inthandler.py FILENAME set to multi/handler/inthandler.py. int4 exploit(multi/handler) > run Listening on 0.0.0.0:4444 Connection from ('127.0.0.1', 34170)