We are currently editing this repository! Stay tuned for updates.
Other update comming on 29.07.2025
✅ Wide Module Support – Over 800+ modules, including OSINT,exploits,auxiliary,encoders, ...
✅ Advanced Exploitation – 500+ exploits (aiming for 2500)
✅ Post-Exploitation Tools – 120+ post-exploit modules (targeting 500+) for persistence and privilege escalation
✅ Auxiliary Modules – 108 supporting tools, with a goal to expand to 1250
✅ OSINT-Specific Modules – 50+ tools for open-source intelligence gathering
✅ Payload Generation – 8+ payloads with encoding support (50 encoders)
✅ Multi-Platform Support – Works on Termux, Kali Linux, and Debian-based systems
✅ Interactive Shell – Real-time command execution with a powerful shell
🚧 Expanding Exploit Library – Increasing to 2500+ exploits and 500+ post-exploit modules
🚧 More Auxiliary Tools – Targeting 1250+ auxiliary modules
🚧 Advanced OSINT Capabilities – Enhancing OSINT modules beyond 200+
🚧 Cloud-Based Modules – Remote exploitation capabilities
🚧 Mobile Device Support – Dedicated Android & iOS modules
🚧 Self-Updating Framework – Automatic module and exploit updates
🚧 Real-Time Attack Analysis – In-depth monitoring of active exploits
🚧 More Commands – want to you are use other commands
intSpLoiT and its developers disclaim any responsibility or liability for improper use of this framework.
Ensure that all dependencies are installed properly.
source ~/.bashrc
2️⃣ If intframework is located under /usr/opt
cd $PREFIX/opt/
mkdir -p intframework
mv $PREFIX/opt/* $PREFIX/opt/intframework
3️⃣ Before running intconsole
cd $INTFRAMEWORK_PATH
mv inttable/inttable $PREFIX/lib/python3.12/
4️⃣ Using inttable module in Python
import inttable.inttable as inttable
inttable.core.activate("root")
inttable.console.run("command")
System Interface:
system photos:
More UI Previews:
apt update && apt upgrade
pkg update && pkg upgrade
pkg install python3
pkg install git
pip3 install requests
git clone https://github.com/intSpLoiT/intframework
cd intframework
chmod +x terbuild.sh
./terbuild.sh
int4-pro > use modules/Auxiliary/social/userscan.py
int4-pro userscan.py(modules/Auxiliary/social/userscan.py) > run <example --lang en>
not rooted
[*] Inspecting module: modules/Auxiliary/social/userscan.py
[+] Module inspection complete.
[*] Running module: modules/Auxiliary/social/userscan.py
[>] Command: python3 modules/Auxiliary/social/userscan.py example --lang en
[+] Find Profile by Username [+]
[+] Username found on: github
[+] Profile URL: https://api.github.com/users/example/events/public
---------------------------------------------------------------------------
[+] Username found on: github
[+] Profile URL: https://api.github.com/users/example
---------------------------------------------------------------------------
[+] Username found on: twitter
[+] Profile URL: https://twitter.com/example
---------------------------------------------------------------------------
^C
[!] Error during module execution: module 'inttable' has no attribute 'write'
int4-pro userscan.py(modules/Auxiliary/social/userscan.py) >
int4 (modular) > use network_scan
[*] Module selected: network_scan
int4 module(network_scan) > show options
[*] Available options for module: network_scan
fs: None
timeout: None
int4 module(network_scan) > set timeout 0.1
[*] timeout = 0.1
int4 module(network_scan) > run
Example Output:
Network Scanner
IP Address | Device Name | Status
---------------------------------------------
192.168.5.1 | Network Scan | Port Active, Ping Active, HTTP Active
192.168.5.3 | Unknown Device | Inactive
192.168.5.8 | Unknown Device | Inactive
int4 (exploiter) > use multi/handler
Exploit 'multi/handler' selected.
int4 exploit(multi/handler) > run
python: can't open file '/storage/emulated/0/intframework/modules/exploits/multi.handler': [Errno 2] No such file or directory
int4 exploit(multi/handler) > set FILENAME multi/handler/inthandler.py
FILENAME set to multi/handler/inthandler.py.
int4 exploit(multi/handler) > run
Listening on 0.0.0.0:4444
Connection from ('127.0.0.1', 34170)