Skip to content

intSpLoiT/intframework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

intSpLoiT Framework

intSpLoiT Framework

Supported OS License Version Python Exploits Post Exploits Auxiliary Modules Encoders Payloads OSINT Modules

We are currently editing this repository! Stay tuned for updates.
Other update comming on 29.07.2025


๐Ÿš€ Features

โœ… Wide Module Support โ€“ Over 800+ modules, including OSINT,exploits,auxiliary,encoders, ...

โœ… Advanced Exploitation โ€“ 500+ exploits (aiming for 2500)
โœ… Post-Exploitation Tools โ€“ 120+ post-exploit modules (targeting 500+) for persistence and privilege escalation
โœ… Auxiliary Modules โ€“ 108 supporting tools, with a goal to expand to 1250
โœ… OSINT-Specific Modules โ€“ 50+ tools for open-source intelligence gathering
โœ… Payload Generation โ€“ 8+ payloads with encoding support (50 encoders)
โœ… Multi-Platform Support โ€“ Works on Termux, Kali Linux, and Debian-based systems โœ… Interactive Shell โ€“ Real-time command execution with a powerful shell


๐Ÿ”ฎ Future Roadmap

๐Ÿšง Expanding Exploit Library โ€“ Increasing to 2500+ exploits and 500+ post-exploit modules
๐Ÿšง More Auxiliary Tools โ€“ Targeting 1250+ auxiliary modules
๐Ÿšง Advanced OSINT Capabilities โ€“ Enhancing OSINT modules beyond 200+
๐Ÿšง Cloud-Based Modules โ€“ Remote exploitation capabilities
๐Ÿšง Mobile Device Support โ€“ Dedicated Android & iOS modules
๐Ÿšง Self-Updating Framework โ€“ Automatic module and exploit updates
๐Ÿšง Real-Time Attack Analysis โ€“ In-depth monitoring of active exploits
๐Ÿšง More Commands โ€“ want to you are use other commands


โš ๏ธ Disclaimer

intSpLoiT and its developers disclaim any responsibility or liability for improper use of this framework.


โš™๏ธ Installation Guide

Before Running the Framework:

Ensure that all dependencies are installed properly.

1๏ธโƒฃ After executing terbuild.sh

source ~/.bashrc

2๏ธโƒฃ If intframework is located under /usr/opt

cd $PREFIX/opt/
mkdir -p intframework
mv $PREFIX/opt/* $PREFIX/opt/intframework

3๏ธโƒฃ Before running intconsole

cd $INTFRAMEWORK_PATH
mv inttable/inttable $PREFIX/lib/python3.12/

4๏ธโƒฃ Using inttable module in Python

import inttable.inttable as inttable

inttable.core.activate("root")
inttable.console.run("command")

๐Ÿ“ท Screenshots

System Interface: system photos: ฤฐntikam21 photos:

More UI Previews:

Photo2 Github Badge


๐Ÿ“ฒ Installing on Termux

apt update && apt upgrade
pkg update && pkg upgrade
pkg install python3
pkg install git
pip3 install requests
git clone https://github.com/intSpLoiT/intframework
cd intframework 

chmod +x terbuild.sh
./terbuild.sh

๐Ÿ” Usage Examples

in the console

int4-pro > use modules/Auxiliary/social/userscan.py
int4-pro userscan.py(modules/Auxiliary/social/userscan.py) > run <example --lang en>
not rooted
[*] Inspecting module: modules/Auxiliary/social/userscan.py
[+] Module inspection complete.
[*] Running module: modules/Auxiliary/social/userscan.py
[>] Command: python3 modules/Auxiliary/social/userscan.py example --lang en
[+] Find Profile by Username [+]
[+] Username found on: github
[+] Profile URL: https://api.github.com/users/example/events/public
---------------------------------------------------------------------------
[+] Username found on: github
[+] Profile URL: https://api.github.com/users/example
---------------------------------------------------------------------------
[+] Username found on: twitter
[+] Profile URL: https://twitter.com/example
---------------------------------------------------------------------------
^C

[!] Error during module execution: module 'inttable' has no attribute 'write'
int4-pro userscan.py(modules/Auxiliary/social/userscan.py) >

in Modular

1๏ธโƒฃ Running a Network Scan Module

int4 (modular) > use network_scan
[*] Module selected: network_scan
int4 module(network_scan) > show options
[*] Available options for module: network_scan
fs: None
timeout: None
int4 module(network_scan) > set timeout 0.1
[*] timeout = 0.1
int4 module(network_scan) > run

Example Output:

Network Scanner
IP Address    | Device Name       | Status
---------------------------------------------
192.168.5.1   | Network Scan      | Port Active, Ping Active, HTTP Active
192.168.5.3   | Unknown Device    | Inactive
192.168.5.8   | Unknown Device    | Inactive

in Exploiter

2๏ธโƒฃ Using inthandler for Exploitation

int4 (exploiter) > use multi/handler
Exploit 'multi/handler' selected.
int4 exploit(multi/handler) > run
python: can't open file '/storage/emulated/0/intframework/modules/exploits/multi.handler': [Errno 2] No such file or directory
int4 exploit(multi/handler) > set FILENAME multi/handler/inthandler.py
FILENAME set to multi/handler/inthandler.py.
int4 exploit(multi/handler) > run
Listening on 0.0.0.0:4444
Connection from ('127.0.0.1', 34170)