SUBSCRIBE PRO VERSION GET STRONG SECURITY AND HELP US TO CREATE NEW NICE FEATURES ;)
The WhatsLock is the new app to protect your data.
With it's possible prevent unauthorized access to your chats thus ensuring your privacy.
The password can be entered by two ways:
- Numeric Password.
- Pattern Lock.
★ Fake Window: If anyone tries to open Messenger a fake window will be displayed that hides names and photos initial page. To unlock and get access to the app the user has to provide their password.
★ Hide Your Friends(Root is needed): You can keep a friend secret by hiding their profile picture.
★ Hide WhatsLock Icon
★ FullScreen to Lock Methods
★ Drunk Mode: Avoid sending improper messages when you drank beyond measure. At midnight to unlock the app you will need to type the password and answer a mathematical question.
★Premium Version: In the Premium Version you get a lot of nice tools for strong security. See on app Premium Account option.
Help us to translate the App to other languages and get PRO App Version for FREE. Send e-mail to firstname.lastname@example.org with subject WhatsLock Translate [Language]
1) How to change password?
Click in "Forgot Password" WhatsLock will be send a recovery e-mail. Check your Spam inbox.
2) I hide WhatsLock icon, how to open AppLock now?
enter #password in your dial pad, and tap call button to open WhatsLock.
If you have any questions or suggestions send an email to: email@example.com
Not that feature rich as Wireshark yet, but it's a powerful debugging tool especially when developing an app.
- Capture network packets and record them.
- SSL decryption using man-in-the-middle technique.
- No root required.
- Easy to use.
- Show packet in either hex or text.
You don't need to setup a dedicated proxy server like mitmproxy, Fiddler or Charles. All you need is just your Android device.
** How to get rid of PIN number **
If you want to get rid of entering PIN number on a lock screen after Packet Capture is uninstalled, it is needed to clear credential storage.
Go to OS Setting->Security->Clear credentials
several famous separate tools and more over offers a good and unique alternative of Wireshark for android.
The main features are:
* network discovery with OS detection
* network traffic analysis
* passwords recovery
* files recovery
WARNING! If you face any problems reinstall busybox and supersu!
Runs on Android >=2.3.3 with root+busybox
Looks better on high resolution, but completely comfortable on 480x720.
ezNetScan - Network Tools
ezNetScan is a handy network tool for network administrators - it scans wireless network and displays the list of all connected devices.
Various other options allow you to easily customize your network list further, including assigning device specific icon, tag name to device and additional note/comment to any device etc...
SNMP based features added which allows you to list out installed software and hardware information of network devices.
- Service Scan
- Wake on LAN
- DNS lookup
- NetBios Name
- Scan TCP Service
- Device IP Address, MAC Address and Manufacture Name
- Custom device name and icons
- Installed Software & Hardware details (It will work for SNMP enabled devices)
It also allows you to email scanned device list & command results. You can also view all your scanned network details in offline mode.
Keywords: Wifi Network, Network Scan, Network Tools, Network Admin, Network Administrator, Network Discovery, Network Inventory, Discover Host/Devices, Wifi, Wi-fi, Ping, Traceroute, Scan Service, Wake on LAN, SNMP, Installed Softwares, Hardware, Storage
WiFinspect is a multi-tool intended for Computer Security professionals and other advanced users that wish to monitor the networks they own or have permission, i.e. the app is a security audit tool and not a hacking tool. The functions include:
* Network Information
* UPnP Device Scanner
* Host Discovery
* Network Sniffer
* Pcap Analyzer (three options)
* PCI DSS (Version 2) Menu
- Access Point Default Password Test (requirement 2.1.1.c)
- Access Point Security Test (requirement 4.1.1)
- Access Point Scanner (requirement 11.1)
- Internal Network Vulnerability Scanner (requirement 11.2.1)
- External Network Vulnerability Scanner (preparation for requirement 11.2.2)
* Host Information
* Port Scan
* Host Vulnerability Scan
This app is a student dissertation by Andreas Hadjittofis as part of his MSc in Computer Security at the University of Birmingham, UK. The project is supervised by Dr Tom Chothia and was released in August 2012. The developers of this app cannot be held responsible for how this app is being used. The app comes with no guarantees.
* Network Information (ROOT): Information about the connected network like MAC and IP addresses, gateway etc
* UPnP Device Scanner: Lists all UPnP devices on the network that are within the view of your device
* Host discovery (ROOT): Uses nmap to discover all devices on the network that are within the view of your device
* Network Sniffer (ROOT): Uses tcpdump to sniff on all packets that are within the view of your device. The resulting pcap files can be analyzed with Wireshark or the built-in Pcap Analyzer
* Pcap Analyzer: Uses jNetPcap to parse a pcap file. Three options: Packet Distribution, Bandwidth Distribution or Communicating Hosts analysis
* Access Point Default Password Test: Checks a pre-set list of default router passwords against your router’s control panel and notifies you if your router is using a default password
* Access Point Security Test: Displays the access points that are within the view of your device with a note whether they are secure (WPA/WPA2) or not (WEP or unlocked)
* Access Point Scanner: Displays the access points that are within the view of your device
* Internal Vulnerability Scanner (ROOT): Uses nmap to find all devices on the network that are within the view of your device. A note is given whether exploits exists for a given device based on its operating system and open ports
* External Vulnerability Scanner (ROOT): Runs Host Information, Port Scan, Host Vulnerability Scan, Traceroute, Ping or Sniffer functions on a given IP address or hostname
* Host Information (ROOT): Uses nmap to retrieve the device’s hostname, MAC address, vendor, operating system, device name and workgroup
* Port Scan (ROOT): Uses nmap to retrieve the device’s open ports. Click on a port to view the Metasploit results for the device's operating system and port
* Host Vulnerability Scanner (ROOT): Uses nmap to retrieve information about the host along with a note stating whether exploits exists for the device based on its operating system and open ports
* Traceroute (ROOT): Uses nmap to traceroute to a host
* Ping (ROOT): Uses nping to ping a host
* ACCESS_WIFI_STATE, CHANGE_WIFI_STATE, ACCESS_NETWORK_STATE: Used to determine if the device is connected to a Wi-Fi network and to retrieve the data displayed in Network Information function
* CHANGE_WIFI_MULTICAST_STATE: Used by the UPnP Device Scanner function
* INTERNET: Used to retrieve the device’s external IP address in Network Information function, for Metasploit search, and for the optional error reporting.
* WRITE_EXTERNAL_STORAGE: Used to store the nmap and pcap files
Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.
For the USB read/write permission: This permission is used to save and load snapshots(see menu in my app).
NETWORK SNIFFER WIDGET on 3G and WIFI
** NEED ROOT ACCESS **
** NOT an application, it's a WIDGET **
** NOT based on tcpdump or libpcap **
- Start/Stop easily a capture in one click from your home screen.
- Detects automatically the type of connection.
- Write a PCAP file which may be read with tools such as Wireshark.
- A notification indicates the number of captured packets and the total size in bytes.
- At the end of the capture, PCAP file may be sent by email.
- Help is available on SniffDroid application.
Please report bugs at firstname.lastname@example.org, thanks.
Captured data are saved as a PCAP file format in the external storage.
If you want a more detailed analysis, please transfer the file to your PC and use the software handles PCAP format(such as Wireshark).
★ Differences between tPacketCapture and tPacketCapture Pro ★
Pro Version include an Application filtering feature.
Application filtering is able to capture only a specific application communication.
WiFi Overview 360 is not only a WLAN Scanner, which shows all WLANs in range, the app is much more.
This app is a "Swiss Army Knife" for WLAN.
With this tool you can manage and optimize your used wireless network and and with one look you'll get detailed information of the WLANs (WLAN name (SSID), signal strength, channelnumber, encryptionin - open or not) in your environment.
The tab "Ch check" (channel checker) and "Ch. radar" (channel radar) are powerful tool to optimize your own wlan network. For best performance your network must use a channel or frequency range where are no other wireless networks or little as possible. WiFi Overview 360 gives you the best choice for the channel.
Main features are:
- wlan scanner
- detailed wlan information
- add WLANs manually
- endless list of known WLANs (previously limited to 16)
- graphical representation of all wireless networks in the operating range
- channel checker for the best channel choice
- included 2x1 widget
- Android 4.x support
- Tablet support
- WLAN Internet connection check
- and much more ...
The "Pro" version contains no ad, have more widgets, have a powerful "WiFi Detector", can set "Quick connect shortcuts", can set WLAN priority and is a little recognition for my work.
For an ad-free version of this app, and to support further development, upgrade to the NFC Sniffer Pro.
This app allows you to explore the contents of the RFID/NFC enabled smart card transponders. This is very useful for anyone programming NFC applications, or for anyone who wants to see what transponders they are carrying around in their purse or wallet.
To scan a smart-card or NFC tag, start the app, then hold the card/tag within a few millimeters of the back of your device (you may have to swipe around a bit to find where the NCF reader is in your device).
The app displays:
* The transponder ID
* RF technologies used
* Type of transponder
* ATQA code
* Target tech classes
* Number of times this transponder has been scanned
Not all android devices support NFC. If your phone or tablet does not support NFC, a message appears on the screen to notify you, and the app closes.
By default, NFC is disabled in most handsets. To use this app, and to use NFC on your device, you must enable NFC in your device settings. If NFC is not enabled on your device, this app displays a message and exits.
This app is no better than the NFC scanner and the RFID tag you are using. Not all phone chips can read all tags. If the phone cannot read the tag, there is nothing the software can do. This app shows whatever NFC contacts the hardware reports to the OS.
If you don't have dSploit, grab it from http://dsploit.net
NOTE: THIS APP HAS SIMILAR REQUIREMENTS TO dSploit
- Your phone must be rooted
- You must have Gingerbread+ (2.3+)
Share your scripts!
- Download scripts created by others.
- Submit your own!
This app is open source and licensed under GPL v3.
You can browse the code here: http://github.com/jkush321/dsploitscripts
The scripts this app downloads are licensed under the MIT License.
You can browse the repository here: http://github.com/infacraft/dsploitscriptsrepo
Root required for this application!
The fastest, most trusted, and #1 BusyBox installer and uninstaller!
Over 10 million installs and over 50,000 5 Star ratings!
Support for arm and intel based devices, mips support coming soon. (I need a mips device)
Mentioned in the new XDA-Developers book "XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming"
Winner of best Utility Software award for Android via Handster.
This is the only installer that is ad free and requires no internet permission!
The source for this application can be found here: https://code.google.com/p/busybox-android/
Featured on the BusyBox website at: http://busybox.net/products.html
The BusyBox source code can be found here: http://git.busybox.net/busybox/
A must have for any rooted phone! Almost EVERY rooted applications needs BusyBox to perform their magic, if you have a rooted phone then you need BusyBox.
Pro version contains Backup feature (for safer installs), uninstall feature, Advance Smart install feature, the ability to hand pick the applets you want, safety check for missing applets on start, and better overall support. The pro version will receive more frequent updates than the free version will.
Please note I did not write BusyBox! I wrote this installer and cross compiled BusyBox for Android. Please see the about menu option for more details or here: www.BusyBox.net
BusyBox is a software application that provides many standard Unix tools, much like the larger (but more capable) GNU Core Utilities. BusyBox is designed to be a small executable for use with the Linux kernel, which makes it ideal for use with embedded devices. It has been self-dubbed "The Swiss Army Knife of Embedded Linux".
Leave this installed if you always want to get the latest version of busybox!
IT IS JUST A LIST, DON'T EXPECT ANYTHING MORE THAN THAT (sorry for all caps, but some people expect matrix meets mission impossible... and give a bad rating when their expectations are not met :) )
Please read the description...
Penetration test is used to test security of something. (if that something passes penetration test, there is a higher chance that hacker cant hack into it)
Apps are sorted with Tags.
Links to Apps on the Play Store.
Links to Apps that are NOT on the Play Store
Links to Source Code of Open Source Apps
Links to App websites.
Links to Google the name of the App or App Package.
Alternative Links to PlayStore and PlayStore Website (just in case someone likes to have those) Some apps are not on the play store, so those links wont work on the Google Play Store, but might work on other Stores (for example Aptoide).
Because there are not many pentest apps for android, there are also some useful apps for network administrators, system administrators, geeks and more :)
Tools will be as soon as i find some. if you found some app that is not there, or have any ideas on how can i make this app better, just hit me up on email.
This app requires permission to access the internet, because this app is actually a browser that is showing my website. (all the info about apps and app links are on that website)
Keywords: network net internet system sys linux pen penetration pentest test testing vulnerability programming hack hacking hacker intrusion security sec protection scanner analyzer anonymous protocol address ip
Retailers, crooks, the government, and others shady individuals are tracking your movements. Even when your Wi-Fi is turned off, your phone may be broadcasting information to whomever is in range which can be used both to track repeated visits to as well as your exact movements in an area under surveillance.
It's not a big step to couple this to personal information - a retailer for example, could track your trip to the register and correlate with your payment information. Now the tracking hardware and software vendors, the store (or chain) owner, their business partners, they can now all track where you are every time you come into range of one of their systems, and fully profile who you are, what you do, your financials, and your daily patterns!
That is just one example, but there are many uses for tracking you. Make no mistake, this is happening in the real world today.
One solution is shutting off Wi-Fi completely (including the background network scanning, a setting most people don't know about), but you would lose benefits like automatically connecting to known Wi-Fi networks and improved location awareness for your apps. It also does nothing to help the situation for others.
Pry-Fi will prevent your device from announcing all the networks it knows to the outside world, but it will still allow background scanning and automatically connecting to Wi-Fi networks. While you are not connected to a Wi-Fi network, the MAC address will constantly be pseudo-randomized, following a pattern that still makes the trackers think you are a real person, but they will not encounter your MAC address again. This will slowly poison their tracking database with useless information.
When you do connect to a Wi-Fi network, unless you specify otherwise, your MAC address will also be randomized - the same MAC address will not be used the next time you connect to this or any other network.
Though of course the companies involved with these trackers claim they wouldn't use the data maliciously, the possibility is there, and we all know that if something can be abused, ultimately it will be. There do not appear to be any laws against these practices yet, nor is it likely Wi-Fi will be redesigned any time soon to get rid of the information leaks.
But we can make an effort to reduce the usefulness of the tracking data for the exploiters. Pry-Fi comes with a War mode, which when enabled tries to make your Android device appear like dozens of people. Just wandering around an area under Wi-Fi location surveillance for a few minutes can ruin the tracking data for the period of your stay.
Proof of Concept
This is proof-of-concept code, and how for it will go in the future depends on interest and how well it works. It has been tested on several devices and seems to work, but it is very young still. The magic the app does to achieve its purpose is ever subject to changing Android security policies and OEM customizations, so even though it works now, there really is no saying if it will still be possible in future firmwares.
Of course you should also keep in mind that tracking can be done in many ways, and these W-Fi signals are far from the only method in use.
Further details, device compatibility information, FAQ, discussion, etc is all available on XDA-Developers.com here: