Overview

dSploit is a free Android application designed to help evaluate network and system security. Built as a portable penetration-testing toolkit, it gathers information about devices on a network and helps auditors identify potential weaknesses. The app runs on Android devices but typically requires root access and a noticeable amount of storage to function fully.

Principal capabilities

  • Intercept and alter network traffic in real time to analyze or manipulate data flows.
  • Capture credentials and other sensitive data transmitted over common protocols (for example, HTTP, FTP, IMAP).
  • Discover hosts on a network, enumerate open ports and running services on those hosts.
  • Probe for known vulnerabilities against discovered services using published vulnerability feeds.
  • Perform network diagnostics such as traceroute and packet capture (PCAP) export.
  • Sweep nearby Wi‑Fi networks to discover access points, associated devices, and supported encryption types.

Core components and what they do

  • Inspector: examines a host to identify the operating system and the services it exposes.
  • Password sniffer: monitors traffic to extract readable authentication information from supported protocols.
  • Vulnerability scanner: cross-references detected services with vulnerability databases to highlight potential risks.
  • Network mapper: enumerates devices on the LAN and builds a topology of reachable hosts.
  • Traffic redirection / MITM utilities: enable routing changes so captured traffic can be saved or analyzed in PCAP format.

Installation requirements and permissions

  • Root privileges are generally necessary for full functionality on Android devices.
  • Permission to read and modify Wi‑Fi settings and to access network state is required.
  • Storage space is needed to store logs, captures, and additional modules.
  • Access to network information (connected devices, interfaces, routing) must be granted for scanning and analysis features.

Typical uses and cautions

  • Intended use cases include on‑device security assessments, network troubleshooting, and vulnerability reconnaissance by authorized personnel.
  • Misuse of interception or credential-capture features against networks or users without permission is illegal and unethical. Use only in environments where you have explicit authorization.
  • Because it interfaces deeply with network subsystems, running the app may affect connectivity and should be tested carefully in controlled environments.

Getting started (high level)

  • Ensure your device meets the root and storage requirements and that you have permission to test the target network.
  • Grant the necessary network and Wi‑Fi permissions during setup.
  • Start with a network map to locate hosts, then use the inspector and vulnerability scanner to prioritize further testing.
  • Export captures (PCAP) for offline analysis and reporting.

This summary reframes the app’s functionality and practical considerations for evaluators and administrators who need a compact suite of network security tools on Android.

Technical

Title
dSploit
Requirements
  • Windows
Language
No language has been specified.
Available languages
License
  • Free
Latest update
2021-07-20
Author
Simone Margaritelli
Other Useful Business Software
MongoDB Atlas runs apps anywhere Icon
MongoDB Atlas runs apps anywhere

Deploy in 115+ regions with the modern database for every enterprise.

MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Rate This App
Login To Rate This App

User Reviews

Be the first to post a review of dSploit!