Introducing And Install WebSploit On Kali Linux

Introducing And Install WebSploit On Kali Linux

WebSploit is an open-source framework for wired and wireless network attacks written in Python. It is using to test web apps networks and uses modules to scan directories, man-in-the-middles, and wireless attacks. This framework is available on Kali Linux by default and you can use it on other distributions. This article presents Introducing And Install WebSploit On Kali Linux. An attacker can view directories that are not ordinarily meant to be seen because of websites misconfigured. Join us to review the ability of WebSploit to scan and attacks. Purchase one of the available packages of Eldernode to prepare your own Linux VPS.

Introducing WebSploit On Kali Linux step by step

Related tools and operating systems of hacking or security are being developed. There are so many powerful tools that facilitate intrusion testing for professionals but also using by many hackers to implement malicious targets. Most hacking and security tools are two-sided since they are used for hacking and for security and intrusion testing. One of the most powerful double-edged tools is the WebSploit tool. Since the directories contain private credentials or configuration files, will use to devise an attack against the server. Hackers use WebSploit to scan targets and view any hidden directories easily.


WebSploit Menu
WebSploit Menu
Recommended Article: Introducing And Use Dex2jar On Kali Linux

Introducing WebSploit Features:

WebSploit supports multiple vulnerabilities. The below list shows the ability of WebSploit to scan and attack:

1. Social Engineering Works

2. Scan, Crawler & Analysis Web

3. Automatic Exploiter

4. Support Network Attacks

5. Autopwn – Used From Metasploit For Scan and Exploit Target Service

6. Wmap – Scan, Crawler Target Used From Metasploit Wmap plugin

7. format infector – inject reverse & bind payload into the file format

8. PHPMyAdmin Scanner

9. Cloudflare resolver

10. LFI Bypasser

11. Apache Users Scanner

12. Dir Bruter

13. Admin finder

14. MLITM Attack – Man Left In The Middle, XSS Phishing Attacks

15. MITM – Man In The Middle Attack

16. Java Applet Attack

17. MFOD Attack Vector

18. USB Infection Attack

19. ARP Dos Attack

20. Web Killer Attack

21. Wifi Dos

22. Fake Access point Attack

23. Bluetooth POD Attack

24. Wifi Jammer

25. Fake Update Attack

26. Wifi Honeypot

How to use WebSploit Tools on Kali Linux

WebSploit Framework is a part of the toolset in Kali Linux distribution. It is used for vulnerability analysis and penetration testing of web applications. WebSploit is known as a fierce competitor to the powerful tool of Metasploit.

Follow the below path to launch WebSploit when you run Kali distributions.

Applications >> Kali Linux >> Web Applications >> Web Application Fuzzers >> Websploit

Install WebSploit On Kali Linux Server

To install WebSploit and any other packages, run the following command:

sudo apt-get install websploit

How to uninstall WebSploit On Kali Linux

You can uninstall WebSploit, use the command below:

sudo apt-get remove websploit

In this way, you can remove just the WebSploit package itself. Also, you can uninstall WebSploit and its dependencies, type:

sudo apt-get remove --auto-remove websploit

Use the command below to delete your local/config for WebSploit:

sudo apt-get purge websploit

Or similarly, like this WebSploit

sudo apt-get purge --auto-remove websploit

Note: You must use the above command with care because Purged config/data can not be restored by reinstalling the package.

Recommended Article: Introducing And Install Cuckoo On Kali Linux


In this article, WebSploit was introduced to you and you learned How To Install WebSploit On Kali Linux. Discuss with your friends on Eldernode Community if you have used any alternative or if you have found any negative points while using this tool.

We Are Waiting for your valuable comments and you can be sure that it will be answered in the shortest possible time.

Leave Your Comment

Your email address will not be published.

We are by your side every step of the way

Think about developing your online business; We will protect it compassionately

We are by your side every step of the way


7 days a week, 24 hours a day