### Please do not download if you do not have a fully working monitor wireless device ###
Droid Dump is a gui for famous wireless auditing tool airodump-ng.
1. Rooted device
2. Wireless network in monitor mode ( you will only be able to select a wireless interface in monitor mode in settings)
3. SDcard ( for saving captured packets)
1. Basic Airodumping
2. Filter by BSSID
3. Filter by Channel
4. Filter by Encryption
5. Save capture file (requires SD card saved in DroidDump folder)
6. Copy BSSID, Client Mac
1. Fake Auth ( will require another app)
2. DeAuth client( will require another app)
3. DeAuth all clients ( will require another app)
for galaxy note 2 users can grab a supported kernel, modules and more from
cyanogen based rom http://goo.gl/QRAKY
stock rom http://goo.gl/fgd63
please install airmon to put your device in monitor mode http://goo.gl/Wv3LA
Please read the description before downloading............
This app can do the work of set [social engineering toolkit] in backtrack. It can phish passwords and set phishing servers up,But you can not phish passwords from Sites like Paypal, you can successfully phish passwords from
common sites like -
it includes a email spoofer which works very well and a working port scanner.You can use apps like Pagekite
to make the server public.
Note- 1) When any password is hacked using phishing by this app u can access the log file [where the passwords are stored] by going to the url server you have created. You can do this by clicking the notification which comes in when u create a phishing server and type in "/log.txt" so that the url looks like "localhost:port/log.txt"
2)This log file can also be accessed by going to folder named [the name which you give when creating a server in alias column] and then go to www and then open log.txt with your text editor..
Facebook page :- https://www.facebook.com/sek4android
** You are required to have made a relevant Advanced Diagnostics purchase(s) to obtain an account ***
The Advanced Diagnostics SmartCard App provides bank style security for your AD key-programming tool and is an alternative to your existing SmartCard & Calculator.
Simply sign in using your AD account and you’re ready to start using the App. It's quick, easy, reduces typing errors and there is no need to recharge your SmartCard. This app can only be used with testers that have been registered to your AD account. The app requires an Internet connection. If you are in an area with no Internet connection, then the AD103 Security Calculator can still be used.
SmartCard and the IQ app can ‘hot swap’ between each other, providing the user with seamless functionality.
• Android Device
• AD Registered Account
• MVPPro / AD100Pro / TCode Pro / Premium Code Pro testers need to be SmartCard enabled
Shares Finder is a simple analog of Windows "My network places". Also, it can be used as SMB client.
- easy in use;
- fast scan;
- shows maximum network information with one click;
- provides downloading and uploading of files and folders;
- flexible scanner customization;
- tests if anonymous access to resource is available;
- determines and shows services vendor and version;
- shows DNS and NetBIOS names;
- shows hardware address(MAC) and wlan adapter vendor of remote devices.
Tags: network discovery, security scanner, network scanner, smb client, shares finder.
This is the Pro version of Ezboot on sale for only $.99!
This transaction is risk free! If you buy EzBoot and it does not work on your device contact the support email: Lfaudmapps@gmail.com within 48 hours of purchase for a full refund.
-> Reboot Recovery
-> Reboot Bootloader (If supported on your device)
-> Reboot Download (If supported on your device)
-> Instant Power Off
-> Reboot Wipe Data (If supported on your device)(Don't worry about accidentally clicking because there is a confirmation screen)
-> No ads
-> Shortcuts/One click widgets for reboot, recovery, bootloader, download mode, and instant power off
This app provides easy access to various ways to reboot your device.
For even easier access add a home screen shortcut.
To add a shortcut: Long press the homescreen > Shortcuts > Without clicking applications, scroll through the list and choose from reboot, recovery, bootloader, download mode, and instant power off
If your device does not reboot or this application force closes it is because your device is not rooted properly or you denied the superuser request.
Made by LFaudm on Eclipse Ide
Thank you for business!
Reboot, Reboot Shortcuts, Easy Reboot
If you don't have dSploit, grab it from http://dsploit.net
NOTE: THIS APP HAS SIMILAR REQUIREMENTS TO dSploit
- Your phone must be rooted
- You must have Gingerbread+ (2.3+)
Share your scripts!
- Download scripts created by others.
- Submit your own!
This app is open source and licensed under GPL v3.
You can browse the code here: http://github.com/jkush321/dsploitscripts
The scripts this app downloads are licensed under the MIT License.
You can browse the repository here: http://github.com/infacraft/dsploitscriptsrepo
IT IS JUST A LIST, DON'T EXPECT ANYTHING MORE THAN THAT (sorry for all caps, but some people expect matrix meets mission impossible... and give a bad rating when their expectations are not met :) )
Please read the description...
Penetration test is used to test security of something. (if that something passes penetration test, there is a higher chance that hacker cant hack into it)
Apps are sorted with Tags.
Links to Apps on the Play Store.
Links to Apps that are NOT on the Play Store
Links to Source Code of Open Source Apps
Links to App websites.
Links to Google the name of the App or App Package.
Alternative Links to PlayStore and PlayStore Website (just in case someone likes to have those) Some apps are not on the play store, so those links wont work on the Google Play Store, but might work on other Stores (for example Aptoide).
Because there are not many pentest apps for android, there are also some useful apps for network administrators, system administrators, geeks and more :)
Tools will be as soon as i find some. if you found some app that is not there, or have any ideas on how can i make this app better, just hit me up on email.
This app requires permission to access the internet, because this app is actually a browser that is showing my website. (all the info about apps and app links are on that website)
Keywords: network net internet system sys linux pen penetration pentest test testing vulnerability programming hack hacking hacker intrusion security sec protection scanner analyzer anonymous protocol address ip
Retailers, crooks, the government, and others shady individuals are tracking your movements. Even when your Wi-Fi is turned off, your phone may be broadcasting information to whomever is in range which can be used both to track repeated visits to as well as your exact movements in an area under surveillance.
It's not a big step to couple this to personal information - a retailer for example, could track your trip to the register and correlate with your payment information. Now the tracking hardware and software vendors, the store (or chain) owner, their business partners, they can now all track where you are every time you come into range of one of their systems, and fully profile who you are, what you do, your financials, and your daily patterns!
That is just one example, but there are many uses for tracking you. Make no mistake, this is happening in the real world today.
One solution is shutting off Wi-Fi completely (including the background network scanning, a setting most people don't know about), but you would lose benefits like automatically connecting to known Wi-Fi networks and improved location awareness for your apps. It also does nothing to help the situation for others.
Pry-Fi will prevent your device from announcing all the networks it knows to the outside world, but it will still allow background scanning and automatically connecting to Wi-Fi networks. While you are not connected to a Wi-Fi network, the MAC address will constantly be pseudo-randomized, following a pattern that still makes the trackers think you are a real person, but they will not encounter your MAC address again. This will slowly poison their tracking database with useless information.
When you do connect to a Wi-Fi network, unless you specify otherwise, your MAC address will also be randomized - the same MAC address will not be used the next time you connect to this or any other network.
Though of course the companies involved with these trackers claim they wouldn't use the data maliciously, the possibility is there, and we all know that if something can be abused, ultimately it will be. There do not appear to be any laws against these practices yet, nor is it likely Wi-Fi will be redesigned any time soon to get rid of the information leaks.
But we can make an effort to reduce the usefulness of the tracking data for the exploiters. Pry-Fi comes with a War mode, which when enabled tries to make your Android device appear like dozens of people. Just wandering around an area under Wi-Fi location surveillance for a few minutes can ruin the tracking data for the period of your stay.
Proof of Concept
This is proof-of-concept code, and how for it will go in the future depends on interest and how well it works. It has been tested on several devices and seems to work, but it is very young still. The magic the app does to achieve its purpose is ever subject to changing Android security policies and OEM customizations, so even though it works now, there really is no saying if it will still be possible in future firmwares.
Of course you should also keep in mind that tracking can be done in many ways, and these W-Fi signals are far from the only method in use.
Further details, device compatibility information, FAQ, discussion, etc is all available on XDA-Developers.com here:
Please note that external hardware (i.e., a USB Sniffer accessory/device) is required to actually capture frames. However, application features can be tried out using the test mode.
* Capture 802.15.4 frames (by using a sniffer 15.4 accessory/device).
* Display captured frames.
* Filtering (by frame type, source address, destination address, and payload).
* Store captured frames on phone memory for future display.
* Export captured frames to PCAP format (Wireshark compatible).
* Live forwarding to an arbitrary IP address using the Zigbee Encapsulation Protocol (ZEP).
* Test mode (to try out application functionality without a sniffer 15.4 accessory/device).
To actually sniff packets you can use the following hardware:
- A Tmote Sky (a.k.a TelosB) configured as a sniffer 15.4 device; or
- A SEED-EYE board configured as a sniffer 15.4 accessory
In general, the SEED-EYE board should work on every Android device (3.1+), while the Tmote Sky works only on Android devices supporting the USB host mode (e.g., the Samsung Galaxy Nexus).
* Nexus S (Tmote sky *not* supported, you must use a SEED-EYE board)
* Galaxy Nexus
More info can be found at http://rtn.sssup.it/index.php/software/sniffer-154
- Daniele Alessandrelli
- Andrea Azzarà
PS: for reporting problems, bug, comments, etc, please send an e-mail to firstname.lastname@example.org. Thanks!
this tool allow admin proof test how can the firewall efficiency handle bad user in local network.
By one click from your hand you can test cut any network connection between internet gateway and
devices in your local network remotely.
This is simple technical how can this application work (you can skip it if you don't understand network
- Every LAN connectable devices have one unique number called MAC Address
-Ehen the device want to communicate with another device they need 2 things,IP Address and MAC Address.
- The device only know destination IP Address(Ex: gateway) but not for Mac Address, it maybe change when that device
reconnect and get new IP that mean you can't static fix this pair of IP and MAC address together.
- Only way to get destination MAC Address is request, the device send ask request command to every devices some thing like this
"Hey! , IP 192.168.1.1 what is your MAC Address?"
- Every devices received this request but not answer except the device who carry ip 192.168.1.1,
this is response "OK, my IP 192.168.1.1 and Mac Address is 12:82:FA:22..." this response not for all, he just only reply to asker.
- when asker received response, they pair IP and MAC together and start communication
- If they ask every time when they want to communicate that make a lot of traffic, so the device
must be cache the pair for a while (Ex: 5 min)
it's look well algorithm to solve this problem but something wrong.
this implement in low level network communication so they miss some check of replier that can make this algorithm weak.
Netcut using vulnerability of implementation send reply command without request to victim the make victim cache wrong
IP and MAC Address. that make they lost connection.
This Application create for testing Network Security only.
If you use for others purpose that mean, it's your own responsibility to deal with the effect.
Developer Will NOT response to all harm that user or application make.
This application develop under GNU General Public License version 3 ,From original version of dsploit.
So you can redistribute, modify under GPLv3.
Source code available here : http://www.comdet.com/Netcut.zip
Distributed form :
It supports 3G, protocol recognition, and many other features.
If you don't understand how to use it, just send me an email, I'll explain it more precisely.
DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Session hijackers!
It monitors your ARP-Table and alerts on any unusual change to this table.
So use it to secure your Facebook, ebay, Twitter, LinkedIn etc accounts from "Man In The Middle" attacks on public WiFi!
IF YOU LIKE DROIDSHEEP GUARD - PLEASE DONATE AT http://www.droidsheep.de
ezNetScan - Network Tools
ezNetScan is a handy network tool for network administrators - it scans wireless network and displays the list of all connected devices.
Various other options allow you to easily customize your network list further, including assigning device specific icon, tag name to device and additional note/comment to any device etc...
SNMP based features added which allows you to list out installed software and hardware information of network devices.
- Service Scan
- Wake on LAN
- DNS lookup
- NetBios Name
- Scan TCP Service
- Device IP Address, MAC Address and Manufacture Name
- Custom device name and icons
- Installed Software & Hardware details (It will work for SNMP enabled devices)
It also allows you to email scanned device list & command results. You can also view all your scanned network details in offline mode.
Keywords: Wifi Network, Network Scan, Network Tools, Network Admin, Network Administrator, Network Discovery, Network Inventory, Discover Host/Devices, Wifi, Wi-fi, Ping, Traceroute, Scan Service, Wake on LAN, SNMP, Installed Softwares, Hardware, Storage
Once suspicious activity is identified you may also want to download WindowsSCOPE Pro 1.0 (15 day trial available) at www.windowsscope.com for an in-depth cyber security analysis and memory forensics. Find advanced persistent threats, botnets, root kits and other malware through detailed analysis including disassembly, interactive graphing, and comparison with Pro. The WindowsSCOPE blog describes several memory forensics and cyber security use cases at www.windowsscope.com (select blog on menu), as well as, shows video tutorials (see a Pro tutorial accessible from this page). WindowsSCOPE Live and Pro work hand-in-hand to analyze Windows machines at its core (kernel, all drivers, processes, virtual memory translation, imports and exports, etc).
Get the server now at www.windowsscope.com/live for live analysis of critical kernel information for cyber security analysis.
FREE CYBER SECURITY FEATURES:
*View Interrupt Descriptor Table (IDT) in real-time to identify hooked system interrupts caused by rootkits, botnets and other malware
*View System Services Descriptor Table (SSDT) in real-time to identify hooked system calls
*View list of open network sockets to identify suspicious network activity, back doors, and cyber attacks
*Create profiles for any number of computers for security analysis
*Quickly switch between profiles to investigate multiple computers on your network analyzing for advanced persistent threats and other cyber security vulnerabilities
The application will start a background service performing the login action automatically after connected to the GovWifi. NO application will be found in the launcher.
*Reconnect after 120 minutes session timeout
*Notification for login status
This game can be pretty hard to beat. No hints, no help, just you and the puzzle. There is no time limit nor move limits. Complete the puzzle quickly and you can submit your time and moves to the global scores.