This app works over Wi-Fi or a cell connection.
You can think of it as Zenmap (the PC GUI), but for Android.
It contains nMap 6.25. This is the most up-to-date and feature rich nMap App on the market, give it a try!
nMapper has layouts optimized for both phones and tablets, and supports Android 2.3-4.2 (Gingerbread to Jellybean).
What devices does this work with?
nMap is compiled for ARM devices, if you have an Intel or MIPS device, this app will not work. (Almost everyone has an ARM device, so if you don't know, you're probably safe)
Why is this app so large?
This app includes a ported version of nMap, and upon extraction will use about 30MB total. I'm sorry if this is a problem for some, but that is the size of an Android App + nMap (which is written in C/C++).
This application will let you connect to your device from a PC and execute commands (like "terminal" and "adb shell") or edit files (through SFTP, WinSCP, Cyberduck, etc...).
If you like this application, you can consider supporting it by upgrading to the pro version with more feature like:
- Extended notification controls
- Homescreen and lockscreen widget
- Shared-key authentication
- WiFi autostart whitelist
- Automation with intents support
q: How can I access to my device once the application is running?
- File Transfer: WinSCP (http://winscp.net).
- Remote Shell: PuTTY (http://goo.gl/XbTF)
- File Transfer: natively supported by most file managers (like Nautilus or Dolphin), just enter the sftp address displayed as "Location".
- Remote Shell: run 'ssh' from the terminal.
- File Transfer: Cyberduck (http://cyberduck.ch).
- Remote Shell: run 'ssh' from the terminal
q: How can I upgrade to the pro version?
a: If you previously purchased SSHDroidPro on Google Play, the new version will automatically detect it and upgrade to pro otherwise you can unlock it as in-app purchase.
q: Why my transfer speed decrease when I turn off the screen?
a: Enable the option 'Lock Wifi'. If your device is running at least Android 2.3.x, you should get full speed transfer even when the screen is off, otherwise enable the option 'Lock screen' too.
q: How can I use a shared key with Putty/Winscp?
a: You have to generate a key from the application in OpenSSH format and use Puttygen to import/convert it in ppk format. A recent version of Puttygen (>= 0.61) is required!
q: Is root required to run this application?
a: root is optional but not required.
q: How can I automate the application start/stop?
Use the following broadcast intents:
Nmap will help you to discover hosts, protocols, open ports, services and its configuration and vulnerabilities on networks.
Frontend supports all known Android architectures: arm, mips and x86.
Nmap binaries are transferred using HTTPS by default.
Network Mapper is released under open source license and source is available on GitHub:
Android binary versions of Nmap are built using following port:
Domain Health Report
Check the health of your DNS configuration from your smartphone. The Domain Health Report tool evaluates a domain configuration with over seventy tests in nine different categories, and shows you what can be changed to optimize your domain.
Visual Traceroute Check the route between your mobile device to a server — both over the network and around the world! The Visual Traceroute tool uses traceroute information and GeoIP data to give you a better sense of the route and physical distance that packets travel over the network from you to the server.
Query any domain nameserver for information from your phone or tablet! You may even select the type of query. The DNS Lookup tool gives you a way to check DNS answers over the mobile or WiFi network so that you can understand what your users may be experiencing with your DNS.
WHOIS Lookup Check DNS domain registration and owner information from the datacenter or conference room — without having to open a laptop. The WHOIS Lookup tool provides a quick way to query WHOIS data from multiple providers.
SSL Examination Is the SSL certificate of a website present — or more importantly, is it valid? Check right from your phone or tablet with the SSL Examination tool.
DNS Speed Test Does your website seem a little slow? Use the DNS Speed Test to check the response time for DNS queries directly from your mobile device — and show the database team that it's their problem, not DNS.
Ping Is the server up? Is the IP address being used? Now with the Ping tool, you can check from anywhere your mobile device has connectivity.
GeoIP Lookup: Where in the world is that IP address hosted? The GeoIP Lookup tool will show you the location information and plot the results on Google Maps.
RBL Lookup: Are your mail servers listed on real-time black lists (RBL)? Now you can check & remove them easily right from your mobile device with the RBL Lookup tool.
Port Scanner: Do you know which TCP ports are open on your network connected servers? The Port Scanner tool performs a quick check for common services — and custom ports. Now you can check if a network service is available (or if you should turn it off).
Connection Speed: Does the network seem slow to you? Check — and compare — network download and upload speeds from your device over whichever network you may be connected to with the Connection Speed tool.
IPv4 to IPv6 converter: Planning to support IPv6 on your network? If you have any transition strategy, you’ll want to know the IPv6 equivalent of IPv4 addresses. You can convert addresses conveniently with the IPv4 to IPv6 Conversion tool
IPv6 Compatibility: Can you reach a domain using IPv6 addressing? Find out if your domain is ready for IPv6 with the IPv6 Compatibility tool.
Device Information: The Device Information tool is a single location for critical information about your mobile device hardware, operating system and connected networks. With it, you no longer need to hunt through the device menus, searching for hard to find device or connection information.
Technical features :
* Fast network discovery
* TCP Service Fingerprints
* Operating System Fingerprints
* Fingerprints of commun CMS for web servers
* 3000+ fingerprints
* User-configurable range of tcp ports
* Fast scan option
* nmap like
* runs on all Android devices
* no need root access
* FREE and NO AD !
Please contribute :
* send us the fingerprints to improve service detection
* report a good evaluation if you want to keep it freeware
* if you found a bug, please email email@example.com with full details. NetAudit is still in development and need your help to be more reliable.
tags: port scanner, tcp scanner, tcp scan, port scan, port scanner, network, security, lan, pentests, hacker, hacking, nmap, free, freeware
The first tab displays information about connected Wi-Fi network (SSID, BSSID, router manufacturer, connection speed, signal strength, frequency, security options).
Networks tab displays all available Wi-Fi networks and their parameters.
Charts show the changes of strength level and speed of a Wi-Fi connection.
WiFinspect is a multi-tool intended for Computer Security professionals and other advanced users that wish to monitor the networks they own or have permission, i.e. the app is a security audit tool and not a hacking tool. The functions include:
* Network Information
* UPnP Device Scanner
* Host Discovery
* Network Sniffer
* Pcap Analyzer (three options)
* PCI DSS (Version 2) Menu
- Access Point Default Password Test (requirement 2.1.1.c)
- Access Point Security Test (requirement 4.1.1)
- Access Point Scanner (requirement 11.1)
- Internal Network Vulnerability Scanner (requirement 11.2.1)
- External Network Vulnerability Scanner (preparation for requirement 11.2.2)
* Host Information
* Port Scan
* Host Vulnerability Scan
This app is a student dissertation by Andreas Hadjittofis as part of his MSc in Computer Security at the University of Birmingham, UK. The project is supervised by Dr Tom Chothia and was released in August 2012. The developers of this app cannot be held responsible for how this app is being used. The app comes with no guarantees.
* Network Information (ROOT): Information about the connected network like MAC and IP addresses, gateway etc
* UPnP Device Scanner: Lists all UPnP devices on the network that are within the view of your device
* Host discovery (ROOT): Uses nmap to discover all devices on the network that are within the view of your device
* Network Sniffer (ROOT): Uses tcpdump to sniff on all packets that are within the view of your device. The resulting pcap files can be analyzed with Wireshark or the built-in Pcap Analyzer
* Pcap Analyzer: Uses jNetPcap to parse a pcap file. Three options: Packet Distribution, Bandwidth Distribution or Communicating Hosts analysis
* Access Point Default Password Test: Checks a pre-set list of default router passwords against your router’s control panel and notifies you if your router is using a default password
* Access Point Security Test: Displays the access points that are within the view of your device with a note whether they are secure (WPA/WPA2) or not (WEP or unlocked)
* Access Point Scanner: Displays the access points that are within the view of your device
* Internal Vulnerability Scanner (ROOT): Uses nmap to find all devices on the network that are within the view of your device. A note is given whether exploits exists for a given device based on its operating system and open ports
* External Vulnerability Scanner (ROOT): Runs Host Information, Port Scan, Host Vulnerability Scan, Traceroute, Ping or Sniffer functions on a given IP address or hostname
* Host Information (ROOT): Uses nmap to retrieve the device’s hostname, MAC address, vendor, operating system, device name and workgroup
* Port Scan (ROOT): Uses nmap to retrieve the device’s open ports. Click on a port to view the Metasploit results for the device's operating system and port
* Host Vulnerability Scanner (ROOT): Uses nmap to retrieve information about the host along with a note stating whether exploits exists for the device based on its operating system and open ports
* Traceroute (ROOT): Uses nmap to traceroute to a host
* Ping (ROOT): Uses nping to ping a host
* ACCESS_WIFI_STATE, CHANGE_WIFI_STATE, ACCESS_NETWORK_STATE: Used to determine if the device is connected to a Wi-Fi network and to retrieve the data displayed in Network Information function
* CHANGE_WIFI_MULTICAST_STATE: Used by the UPnP Device Scanner function
* INTERNET: Used to retrieve the device’s external IP address in Network Information function, for Metasploit search, and for the optional error reporting.
* WRITE_EXTERNAL_STORAGE: Used to store the nmap and pcap files
In its first version Nipper has 10 different modules, to collect information about a specific URL.
Its interface has been designed so that only some "hints" in its interface extraerías much of their information.
- IP Server
- CMS Detect & Version
- DNS Lookup
- Nmap SERVER IP ports
- Enumeration Users
- Enumeration Plugins
- Find Exploit Core CMS
- Find Exploit DB
- Solve CloudFlare
Nipper NOT require ROOT, only requires internet permission.
Compatible from Android 2.3 L.
SileNet will automatically turn off the phone ringer or switch it to vibrate mode when a SileNet Wi-Fi network is detected. The SileNet networks are being used at cinemas, theaters, conference rooms, lecture halls, offices and anywhere that a quiet environment is required in order to maintain a relaxed ambiance.
How to use the application:
Download the free application, switch it on by touching the SileNet logo and then choose Vibrate or Silent mode.
When entering a place with a SileNet network, the phone will automatically switch to silent-vibrate mode in about 15 minutes, and will automatically switch back to ringer mode after leaving the SileNet network area.
If you would like the phone to ignore a SileNet network, choose that network from the list on the second screen. You can always go back and delete an 'ignored network' by choosing it from the list on the third screen and refresh.
Keep the application turned on at all times to enjoy it anywhere you go.
How can the Wi-Fi router work with SileNet?
Simply add the word SileNet to the Wi-Fi router address anywhere you like (For example: Freesilenet, Silenet.room.network, WiFi-Silenet, etc.) Note: The router does not need to be connected to the internet in order for the application to work.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
© Copyright SileNet All rights reserved
* Discover all UPnP devices in the network
* Discover DIAL devices including Chromecast and Fire TV
* Filter device by device type
* Automatic update when devices are added/removed from the network
* Device details for selected devices
** The application is based on the Cling - Java/Android UPnP library http://4thline.org/projects/cling/
The application is working implementation of the tool discussed in this research paper "Android phone based appraisal of app behavior on cell networks" (http://dl.acm.org/citation.cfm?id=2593916)
Quantifying an application’s signaling eﬃciency requires information about:
The data packets that were exchanged.
Corresponding RRC state transitions.
Unlike the existing applications and tools, this application neither requires any special hardware, nor retrieves RRC state in an oﬄine manner using a simulator. The functionality of the tool is split into two parts, the Packet Sniffer and the RRC State Logger.
The packet sniﬀer uses C_packetCapture a binary executable of libpcap, built using libpcap source code and Android NDK. The executable is launched in a shell with superuser privileges. The packet sniﬀer enables us to capture all uplink and downlink packets associated with a network interface, and stores the packet timestamp and header information corresponding to IP, UDP, TCP, and ICMP protocols, in a log.text ﬁle.
RRC State Logger
For Retrieving RRC States, we adopt a novel approach to ﬁnd and record the actual RRC state of the device at any given instant. Android Secret codes are required to switch to RRC service mode. The resulting RRC state transitions with timestamp are stored in a dump.txt file on sdcard.Currently we have secret codes for limited samsung devices, though a wide variety of secret codes are available for different manufacturers.
The detailed description of calculating an application's signalling efficiency from the data collected using our app (RRCpacketSniffer) has been described in this paper "Android phone based appraisal of app behavior on cell networks".
Currently the application supports all Samsung devices ranging from Galaxy S to Galaxy S5. We are working on getting support for other brand devices as well. All devices would require root permission.
Copyright (c), Indraprastha Institute of Information Technology Delhi
Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice is mentioned and research paper is cited.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Works with Wi-Fi, USB, Bluetooth and 3G interfaces.
* Host / IP Scanner with a minimal Port Scanner
* Find tethered hosts if tethering is enabled
* Android & Raspberry Pi detection
* Export scan results in CSV format
* Remember hosts with a custom name
* Access open ports with other Android apps
* Info about IPv4 subnet, broadcast and IPv6 subnet
* Quick scan, ad-free
This program is compatible with Windows, Mac OS X, and Linux provided a Java Runtime Environment.
The current revision is a complete rewrite. It features more efficient memory and network algorithms, multicast instead of broadcast, and easier multi-user configuration.
This app was designed for private networks and does not encrypt your keystrokes. Avoid this program for confidential data entry.
The website isn't finished, but the Java Web Start application at https://wjholden.com/numpad works flawlessly by my testing. Send feature requests and bug reports by e-mail, I love a challenge!
To effectively use this program you will need to open the applet at wjholden.com/kurosuke and also download the game from tsholden.com.
All source code and documentation is freely available on our websites.