DOKK / manpages / debian 10 / websploit / websploit.1.en
WEBSPLOIT(1) General Commands Manual WEBSPLOIT(1)

websploit - Advanced MITM Framework

websploit

Websploit is an automatic vulnerability assessment, web scanner and exploiter tool. It is python command line tool that is composed on modular structure pretty similar to Metasploit. There are currently 20 modules into four sections. The command line does not accept any options. User just get into console typing "websploit" and the prompt will change to this: wsf >

Shows all command you can type in the websploit console. Some of them are only aplicable when using a certain module.
Show Modules of Current Database
Select Module For Use
Show Current Options Of Selected Module
Once you had seen the options of the selected module, you may use this command to define its desired value.
Scan Wifi (Wireless Modules)
Stop Attack & Scan (Wireless Modules)
Execute Module
Run console commands (ex : os ifconfig)
Exit current module
Both of them are disabled on Debian systems in order to avoid conflicts with apt-get.
Shows info about the author.

sf > use web/apache_users
wsf:Apache User > show options

Options Value ----------- ---------------- URL http://example.com wsf:Apache User > set url myown.example.org URL => myown.example.org wsf:Apache User > run [*] Your Target : myown.example.org [*]Loading Path List ... Please Wait ... [~root] ... [400 Bad Request] [~toor] ... [400 Bad Request] [~bin] ... [400 Bad Request] [~daemon] ... [400 Bad Request] [~adm] ... [400 Bad Request] [~lp] ... [400 Bad Request] [~sync] ... [400 Bad Request] etc

Fardin Allahverdinazhand <0x0ptim0us@Gmail.com>

This manual page was written by Marcos Fouces <mfouces@yahoo.es>, for the Debian project (and may be used by others).