We are currently editing this repository! Stay tuned for updates.
Other update comming on 20.08.2025
intSpLoiT is a modular penetration testing framework with over 800+ modules including exploits, post-exploitation, OSINT tools, and payloads.
It is designed for security researchers, red teams, and ethical hackers who need flexibility, power, and scalability.
💡 Interested in developing the framework core? See CORE_DEVELOPERS.md 💬 Discord: velgrath_
✅ Wide Module Support – Over 800+ modules, including OSINT,exploits,auxiliary,encoders, ...
✅ Advanced Exploitation – 500+ exploits (aiming for 2500
✅ Post-Exploitation Tools – 120+ post-exploit modules (targeting 500+) for persistence and privilege escalation
✅ Auxiliary Modules – 108 supporting tools, with a goal to expand to 1250
✅ OSINT-Specific Modules – 50+ tools for open-source intelligence gathering
✅ Payload Generation – 8+ payloads with encoding support (50 encoders)
✅ Multi-Platform Support – Works on Termux, Kali Linux, and Debian-based systems
✅ Interactive Shell – Real-time command execution with a powerful shell
🚧 Expanding Exploit Library – Increasing to 2500+ exploits and 500+ post-exploit modules
🚧 More Auxiliary Tools – Targeting 1250+ auxiliary modules
🚧 Advanced OSINT Capabilities – Enhancing OSINT modules beyond 200+
🚧 Cloud-Based Modules – Remote exploitation capabilities
🚧 Mobile Device Support – Dedicated Android & iOS modules
🚧 Self-Updating Framework – Automatic module and exploit updates
🚧 Real-Time Attack Analysis – In-depth monitoring of active exploits
🚧 More Commands – want to you are use other commands
intSpLoiT and its developers disclaim any responsibility or liability for improper use of this framework.
Ensure that all dependencies are installed properly.
source ~/.bashrc2️⃣ If intframework is located under /usr/opt
cd $PREFIX/opt/ mkdir -p intframework mv $PREFIX/opt/* $PREFIX/opt/intframework3️⃣ Before running intconsole
cd $INTFRAMEWORK_PATH mv inttable/inttable $PREFIX/lib/python3.12/4️⃣ Using inttable module in Python
import inttable.inttable as inttable inttable.core.activate("root") inttable.console.run("command")System Interface: system photos: 
More UI Previews:
apt update && apt upgrade pkg update && pkg upgrade pkg install python3 pkg install git pip3 install requests git clone https://github.com/intSpLoiT/intframework cd intframework chmod +x terbuild.sh ./terbuild.shint4-pro > use modules/Auxiliary/social/userscan.py int4-pro userscan.py(modules/Auxiliary/social/userscan.py) > run <example --lang en> not rooted [*] Inspecting module: modules/Auxiliary/social/userscan.py [+] Module inspection complete. [*] Running module: modules/Auxiliary/social/userscan.py [>] Command: python3 modules/Auxiliary/social/userscan.py example --lang en [+] Find Profile by Username [+] [+] Username found on: github [+] Profile URL: https://api.github.com/users/example/events/public --------------------------------------------------------------------------- [+] Username found on: github [+] Profile URL: https://api.github.com/users/example --------------------------------------------------------------------------- [+] Username found on: twitter [+] Profile URL: https://twitter.com/example --------------------------------------------------------------------------- ^C [!] Error during module execution: module 'inttable' has no attribute 'write' int4-pro userscan.py(modules/Auxiliary/social/userscan.py) >int4 (modular) > use network_scan [*] Module selected: network_scan int4 module(network_scan) > show options [*] Available options for module: network_scan fs: None timeout: None int4 module(network_scan) > set timeout 0.1 [*] timeout = 0.1 int4 module(network_scan) > run Example Output:
Network Scanner IP Address | Device Name | Status --------------------------------------------- 192.168.5.1 | Network Scan | Port Active, Ping Active, HTTP Active 192.168.5.3 | Unknown Device | Inactive 192.168.5.8 | Unknown Device | Inactive int4 (exploiter) > use multi/handler Exploit 'multi/handler' selected. int4 exploit(multi/handler) > run python: can't open file '/storage/emulated/0/intframework/modules/exploits/multi.handler': [Errno 2] No such file or directory int4 exploit(multi/handler) > set FILENAME multi/handler/inthandler.py FILENAME set to multi/handler/inthandler.py. int4 exploit(multi/handler) > run Listening on 0.0.0.0:4444 Connection from ('127.0.0.1', 34170) 

