This app is simply a wrapper around a cross-compiled Nmap binary built for your Android phone.
Source available at http://pips.wjholden.com/src/ in accordance with the GNU Public License.
Q: I want to run Nmap myself from a terminal. Where are the binaries?
A: The binaries are (usually) saved in /data/data/com.wjholden.nmap/bin/.
Q: Is this a GPL violation?
A: I'm not a lawyer, but I don't think so. My sources are freely available and also licensed by the GPL. You are free to modify and redistribute my code provided you share those changes back, IAW the GPL. Free software is not always zero cost.
Q: Where is the source code?
A: Distributing source code along with Android applications is a bit impractical. Download the source code from http://nmap.wjholden.com/src/.
Q: Wait, you're not Fyodor!
A: This is NOT an official release from http://nmap.org, this is simply a front-end that calls to a precompiled Nmap binary.
Q: Do I need root?
A: No! You can use this program with or without root, although there are a few advantages to having root. I've seen a few problems with -O for Operating System fingerprinting (this would happen on desktop Linux as well). Non-root users will usually need to use the --system-dns argument.
Q: What's up with Atrix?
A: I don't know why, but this program has never worked with the Motorola Atrix, despite extensive efforts toward compatibility.
Q: Is NSE supported?
A: No, NSE/LUA are not supported for now, but it's definitely on the radar for a future revision. Some command-line arguments will not be available until then.
This app works over Wi-Fi or a cell connection.
You can think of it as Zenmap (the PC GUI), but for Android.
It contains nMap 6.25. This is the most up-to-date and feature rich nMap App on the market, give it a try!
nMapper has layouts optimized for both phones and tablets, and supports Android 2.3-4.2 (Gingerbread to Jellybean).
What devices does this work with?
nMap is compiled for ARM devices, if you have an Intel or MIPS device, this app will not work. (Almost everyone has an ARM device, so if you don't know, you're probably safe)
Why is this app so large?
This app includes a ported version of nMap, and upon extraction will use about 30MB total. I'm sorry if this is a problem for some, but that is the size of an Android App + nMap (which is written in C/C++).
Fast and accurate, Fing is a professional App for network analysis. A simple and intuitive interface helps you evaluate security levels, detect intruders and resolve network issues.
+ Discovers all devices connected to a Wi-Fi network. Unlimited devices and unlimited networks, for free!
+ Displays MAC Address and device manufacturer.
+ Enter your own names, icons, notes and location
+ Full search by IP, MAC, Name, Vendor and Notes
+ History of all discovered networks.
+ Share via Twitter, Facebook, Message and E-mail
+ Service Scan: Find hundreds of open ports in a few seconds.
+ Wake On LAN: Switch on your devices from your mobile or tablet!
+ Ping and traceroute: Understand your network performances.
+ Automatic DNS lookup and reverse lookup
+ Checks the availability of Internet connection
+ Works also with hosts outside your local network
+ Tracks when a device has gone online or offline
+ Launch Apps for specific ports, such as Browser, SSH, FTP
+ Displays NetBIOS names and properties
+ Displays Bonjour info and properties
+ Supports identification by IP address for bridged networks
+ Sort by IP, MAC, Name, Vendor, State, Last Change.
+ Free of charge, no banner Ads
+ Available for iPhone, iPad and iPod Touch with retina and standard displays.
+ Integrates with Fingbox to sync and backup your customizations, merge networks with multiple access points, monitor remote networks via Fingbox Sentinels, get notifications of changes, and much more.
+ Fing is available on several other platforms, including Windows, OS X and Linux. Check them out!
WiFinspect is a multi-tool intended for Computer Security professionals and other advanced users that wish to monitor the networks they own or have permission, i.e. the app is a security audit tool and not a hacking tool. The functions include:
* Network Information
* UPnP Device Scanner
* Host Discovery
* Network Sniffer
* Pcap Analyzer (three options)
* PCI DSS Menu
- Access Point Default Password Test (requirement 2.1.1.c)
- Access Point Security Test (requirement 4.1.1)
- Access Point Scanner (requirement 11.1)
- Internal Network Vulnerability Scanner (requirement 11.2.1)
- External Network Vulnerability Scanner (preparation for requirement 11.2.2)
* Host Information
* Port Scan
* Host Vulnerability Scan
This app is a student dissertation by Andreas Hadjittofis as part of his MSc in Computer Security at the University of Birmingham. The project is supervised by Dr Tom Chothia. The developers of this app cannot be held responsible for how this app is being used. The app comes with no guarantees.
* Based on your reports, Nmap WILL NOT WORK on devices running Android 2.1 and 2.2. You will get the "Some binaries could not be installed" error message and will be presented with the non-root mode. If you are using a newer Android version, please email me.
* Network Information (ROOT): Information about the connected network like MAC and IP addresses, gateway etc
* UPnP Device Scanner: Lists all UPnP devices on the network that are within the view of your device
* Host discovery (ROOT): Uses nmap to discover all devices on the network that are within the view of your device
* Network Sniffer (ROOT): Uses tcpdump to sniff on all packets that are within the view of your device. The resulting pcap files can be analyzed with Wireshark or the built-in Pcap Analyzer
* Pcap Analyzer: Uses jNetPcap to parse a pcap file. Three options: Packet Distribution, Bandwidth Distribution or Communicating Hosts analysis
* Access Point Default Password Test: Checks a pre-set list of default router passwords against your router’s control panel and notifies you if your router is using a default password
* Access Point Security Test: Displays the access points that are within the view of your device with a note whether they are secure (WPA/WPA2) or not (WEP or unlocked)
* Access Point Scanner: Displays the access points that are within the view of your device
* Internal Vulnerability Scanner (ROOT): Uses nmap to find all devices on the network that are within the view of your device. A note is given whether exploits exists for a given device based on its operating system and open ports
* External Vulnerability Scanner (ROOT): Runs Host Information, Port Scan, Host Vulnerability Scan, Traceroute, Ping or Sniffer functions on a given IP address or hostname
* Host Information (ROOT): Uses nmap to retrieve the device’s hostname, MAC address, vendor, operating system, device name and workgroup
* Port Scan (ROOT): Uses nmap to retrieve the device’s open ports. Click on a port to view the Metasploit results for the device's operating system and port
* Host Vulnerability Scanner (ROOT): Uses nmap to retrieve information about the host along with a note stating whether exploits exists for the device based on its operating system and open ports
* Traceroute (ROOT): Uses nmap to traceroute to a host
* Ping (ROOT): Uses nping to ping a host
* ACCESS_WIFI_STATE, CHANGE_WIFI_STATE, ACCESS_NETWORK_STATE: Used to determine if the device is connected to a Wi-Fi network and to retrieve the data displayed in Network Information function
* CHANGE_WIFI_MULTICAST_STATE: Used by the UPnP Device Scanner function
* INTERNET: Used to retrieve the device’s external IP address in Network Information function, for Metasploit search, and for the optional error reporting.
* WRITE_EXTERNAL_STORAGE: Used to store the nmap and pcap files
PLEASE USE DEBIAN INSTED OF UBUNTU !!! (Support only for Debian, Ubuntu only for real advanced users).
The GUI is handled by "Linux Installer Advanced" version !
Please, if you encounter any issue, send a bug report. Click on console, wait 1mn for the console to appear, then Menu, Mail, and send.
This application will allow you to install a complete Debian distribution in your Android device. Based on chroot, it will perform a standard debootstrap and install a legacy Debian so that you can install, and run any classic Linux command, tool, daemon or service.
The package has few limitations; it is not restricted to Debian; we already offer the choice to use Ubuntu, and will add more distributions in close future. Each distribution is available in several tastes (stable, testing ...). It will not require to reboot; chroot is run inside Android. Installation can be done on any storage device, either on SD card, or inernal memory; no need to repartition any thing, run mkfs or fdisk. We do with what you let use. If you have almost nothing, the package will manage with almost nothing; if you can afford for a large ext4 partition on your SD card, the package will be happy to use it.
It will allow you to install all classic LAMP services like Apache, MySql, PHP, Samba, Netatalk, or just any classic Linux tool like vim, xterm, aterm, Abiword, Firefox, dillo, wget, cron, Perl, Python ... just everything.
Package utilisation will require a rooted device.
Reasons to install this package can not be listed. Just too many: want a cron daemon ? want to have gcc inside your phone ? want to recompile some kernel driver because the legacy Android driver for your Wi-Fi card has is bogus or limited ? want to use vim, or the real full featured desktop ls, ip, nmap, or top commands ? this package will give you all this for free, and much much more.
- an Android device based on some Linux kernel
- a rooted environment
- 300M free space
Only 50MiB to download for a basic Debian, and down to 180MiB space used if you select the Directory method.
Optionnal registration on our website, http://android.galoula.com/LinuxInstall/Register.php , will allow you to use advanced management features, and install package from within the application interface. You will not need to type any strange command in any terminal. And you will be able to make some services start automaticly at phone boot, and/or application start.
Online documentation: http://android.galoula.com/en/LinuxInstall/
Quick installation guide: http://android.galoula.com/en/LinuxInstall/QuickTutorial.html
The interface have been completely redesigned, and the English language have been rewritten. Any one who feels like translating is welcome to contact us. Even the French language part should be re-translated from English.
Nmap will help you to discover hosts, protocols, open ports, services and its configuration and vulnerabilities on networks.
Frontend supports all known Android architectures: arm, mips and x86.
Nmap binaries are transferred using HTTPS by default.
Network Mapper is released under open source license and source is available on GitHub:
Android binary versions of Nmap are built using following port:
**** Requires Android Terminal
Network Mapper Installer is an Installer of Nmap for android.
It is a cross complied binary for android
Network Mapper Installer is a security scanner that installs nmap,nping and ncat to your device.
nmap is utility for network discovery and security auditing. it use for such as network inventory, managing service upgrade schedules, and monitoring host or service uptime and it can provide further information on targets, including reverse DNS names, device types, and also Ncat for flexible data transfer, redirection, and debugging tool and a packet generation and response analysis tool Nping.
it can scan host discovery, port scanning (Both), OS detection and version detection and much more.
nmap originally written by Gordon Lyon licensed under the GNU GENERAL PUBLIC LICENSE
*Installation takes 40 to 50 seconds
*if you found a bug, please email firstname.lastname@example.org with details.
Learn more about Nmap at http://nmap.org
Remember to +1 and rate this
Domain Health Report
Check the health of your DNS configuration from your smartphone. The Domain Health Report tool evaluates a domain configuration with over seventy tests in nine different categories, and shows you what can be changed to optimize your domain.
Visual Traceroute Check the route between your mobile device to a server — both over the network and around the world! The Visual Traceroute tool uses traceroute information and GeoIP data to give you a better sense of the route and physical distance that packets travel over the network from you to the server.
Query any domain nameserver for information from your phone or tablet! You may even select the type of query. The DNS Lookup tool gives you a way to check DNS answers over the mobile or WiFi network so that you can understand what your users may be experiencing with your DNS.
WHOIS Lookup Check DNS domain registration and owner information from the datacenter or conference room — without having to open a laptop. The WHOIS Lookup tool provides a quick way to query WHOIS data from multiple providers.
SSL Examination Is the SSL certificate of a website present — or more importantly, is it valid? Check right from your phone or tablet with the SSL Examination tool.
DNS Speed Test Does your website seem a little slow? Use the DNS Speed Test to check the response time for DNS queries directly from your mobile device — and show the database team that it's their problem, not DNS.
Ping Is the server up? Is the IP address being used? Now with the Ping tool, you can check from anywhere your mobile device has connectivity.
GeoIP Lookup: Where in the world is that IP address hosted? The GeoIP Lookup tool will show you the location information and plot the results on Google Maps.
RBL Lookup: Are your mail servers listed on real-time black lists (RBL)? Now you can check & remove them easily right from your mobile device with the RBL Lookup tool.
Port Scanner: Do you know which TCP ports are open on your network connected servers? The Port Scanner tool performs a quick check for common services — and custom ports. Now you can check if a network service is available (or if you should turn it off).
Connection Speed: Does the network seem slow to you? Check — and compare — network download and upload speeds from your device over whichever network you may be connected to with the Connection Speed tool.
IPv4 to IPv6 converter: Planning to support IPv6 on your network? If you have any transition strategy, you’ll want to know the IPv6 equivalent of IPv4 addresses. You can convert addresses conveniently with the IPv4 to IPv6 Conversion tool
IPv6 Compatibility: Can you reach a domain using IPv6 addressing? Find out if your domain is ready for IPv6 with the IPv6 Compatibility tool.
Device Information: The Device Information tool is a single location for critical information about your mobile device hardware, operating system and connected networks. With it, you no longer need to hunt through the device menus, searching for hard to find device or connection information.
Technical features :
* Fast network discovery
* TCP Service Fingerprints
* Operating System Fingerprints
* Fingerprints of commun CMS for web servers
* 3000+ fingerprints
* User-configurable range of tcp ports
* Fast scan option
* nmap like
* runs on all Android devices
* no need root access
* FREE and NO AD !
Please contribute :
* send us the fingerprints to improve service detection
* report a good evaluation if you want to keep it freeware
* if you found a bug, please email email@example.com with full details. NetAudit is still in development and need your help to be more reliable.
tags: port scanner, tcp scanner, tcp scan, port scan, port scanner, network, security, lan, pentests, hacker, hacking, nmap, free, freeware
bitShark is a powerful and feature rich packet capture and analysis application for Android
It's like Wireshark for Android!
Please try the Free Trial Version of bitShark before purchasing to test compatibility with your devices
- Realtime view/inspection of incoming packets
- Network packet capture to PCAP file format from any interface (Wifi or Cellular)
- Detailed inspection of a wide range of IP networking protocols
- Supports tcpdump style capture filter syntax
- Ability to open and analyze offline PCAP files
- Built-in file browser for choosing PCAP files to open from anywhere on your device
- Detailed statistical analysis of PCAP files
- Powerful filtering architecture allows user to build complex filtered views of offline data
- Ability to export PCAP stats to PDF
- Ability to export individual packets to separate PCAP file
- Ability to reassemble and save web images from TCP streams
(works with popular apps and mobile sites like Facebook and Instagram!)
IPv4, IPv6, UDP, TCP, HTTP, Web Images, HTML, DNS, mDNS, ICMP, ARP, Ethernet, PPP, SNAP, SLL, 802.3, 802.2, SIP, SDP, VLAN (802.1q), L2TP
Trial Version available for free here:
NOTE: This application requires ROOT permission to capture live packets.
Root is not required for offline viewing and analysis.
If you're having trouble capturing packets (crash after a few seconds of capturing) please try unchecking "Enable Live Indexing" in the Settings menu. A fix for this problem is in the works.
Using this application on Android 4.2 with full device encryption enabled or forcing the app to be moved to external storage may cause instability.
If you're having capture or installation issues please try doing a "Force Reinstall" through the new bitShark Installer activity which can be accessed through the Settings activity. Then force close the app and see if that fixes your problem.
Like bitShark on Facebook:
Follow bitShark on Twitter @bitSharkAndroid
Captured data are saved as a PCAP file format in the external storage.
★ Differences between Normal and Pro Version ★
Pro Version include an Application filtering feature.
Application filtering is able to capture only a specific application communication.
If you want a more detailed analysis, please transfer the file to your PC and use the software handles PCAP format(such as Wireshark).
Please try the tPacketCapture(Free) before downloading the tPacketCapture Pro(Paid).
* Some device's VPN Service does not work correctly.
* tPacketCapture and tPacketCapture Pro can't write capture data on time when use a realtime media app.
For example, VoIP, youtube, etc.
(tPacketCapture and tPacketCapture Pro try to write all packets data to a file, but File I/O is too slow..)
Note that sometimes this app will just crash while opening a file. Just try it again and it should work.
If you have any problems or want to request a feature, contact firstname.lastname@example.org
Includes a portscanner for security audit scans and a MAC vendor database to identify NIC manufacturers
Can detect firewalled and stealthed computers, quite useful if you are looking for a windows/firewall box that you can't see on your network!
Useful if you want to find FTP servers, SSH servers, SMB servers etc on your network and would help you to diagnose faults.
You can save the scan results as a CSV file which can be imported into Excel/Google Spreadsheet/LibreOffice
Built for speed and reliability. Throw anything at it and it should cope (even on a 3G network :-)) If you want a specific feature, let me know!