APKInspector : The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps. Download
Burp Suite: It is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing
Androguard: Create your own static analysis tool,; Analysis a bunch of android apps,; Analysis . Open source database of android malware.
Android Framework for Exploitation :
Smartphone Pentest Framework: Rather this tool allows you to assess the security of the smartphones in your environment in the manner you’ve come to expect with modern penetration testing tools.
Android Network Toolkit (ANTI)
This app is capable of mapping your network, scanning for vulnerable devices or configuration issues. It is for use by the amateur security enthusiast home user to the professional penetration tester, ANTI provides many other useful features such as:
easy connection to open ports, visual sniffing (URLs & Cookies) and - establishing
MiTM attacks (using predefined and user-defined filters), Server Side / Client Side Exploits, Password cracker to determine password’s safety level, Replace Image as
visual in demos and Denial of Service attacks. All this is packed into a very user-friendly and intuitive Android app (and soon to be released iOS app).
->ANONdroid v. 00.00.008 : JonDonym proxy client for Android
ANONdroid is a client application for the AN.ON anonymisation service. This service allows a user to browse the Web anonymously.
ANONdroid acts as a proxy for your internet applications and will forward the traffic
of your internet applications encrypted to the mix cascades.
ANONdroid uses the core libraries of JonDo with a smartphone compatible GUI.
Am I Hacker Proof
Am I Hacker Proof scans your network, computer or website from the outside as a hacker would, looking for vulnerabilities. Once it finds the vulnerabilities, it will email or text you
letting you know how many vulnerabilities you have. In addition, in the paid version you can check to see if your voicemail on your cell phone is hacker proof.
This App does not use any resources on your phone. Once you start a scan you will be
notified via email or text your scan started. When your scan is completed you will be notified again that your scan is complete.
Am I Hacker Proof includes these services for free:
- Choose from three types of scans: A “Quick” scan (up to four hours), a “Complete” scan
(can take up to four days to complete), and a Web site scan (searches for vulnerabilities in certain types of Web sites; currently supports WordPress Web sites).
- You can perform a scan on any Web or IP address.
- You can scan up to 10 times a month.
- Built- in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real
time cyber security news feeds.
- Your reports are saved in a PDF file that you can read on your device or forward to any email address you like.
- Your account on your device works on the website www.AmIHackerProof.com so you can have access to more applications.
-> Voicemail Hacking.
- Built-in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real time cyber security news feeds.
- Search through the scans you performed by address, time, number of vulnerabilities, or status.
- You get an email and text message letting you know the number of vulnerabilities found on that IP address or website.
Droid Pentest: Its help you to find all android apps for penetration testing and hacking so you can make complete penetration test platform . This Tool developed by Nikhalesh Singh.
Android SDK: A software development kit that enables developers to create applications for the Android platform. The Android SDK includes sample projects with source code.
DroidBox: Its developed to offer dynamic analysis of Android applications. The following information is shown in the results, generated when analysis is ended:
• Hashes for the analyzed package
• Incoming/outgoing network data
• File read and write operations
• Started services and loaded classes through DexClassLoader
• Information leaks via the network, file and SMS
• Circumvented permissions
• Cryptography operations performed using Android API
• Listing broadcast receivers
• Sent SMS and phone calls
Additionally, two images are generated visualizing the behavior of the package. One showing the temporal order of the operations and the other one being a treemap that can be used to check similarity between analyzed packages.
Dex2jar: dex2jar is a lightweight package that provide you with four components in order to work with .dex and java .class files. dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM.
Jd-gui: JD-GUI is a standalone graphical utility that displays Java source codes of “.class” files. You can browse the reconstructed source code with the JD-GUI for instant access to methods and fields.
Wifi Protector - Protect Your Android From Wi-Fi Sniffing Attacks
The only app that is able to countermeasure "Man In The Middle" attacks on Android platform - Wifi Protector. No other app provides this type of high network security. Protects your phone from tools like FaceNiff, Cain & Abel, ANTI, Ettercap, DroidSheep,
NetCut,and all others that try to hijack your session via "Man In The Middle" through ARP spoofing / ARP poisoning.
-> Free Avast Antivirus For Android Security
Full-featured Antivirus and Anti-Theft security for your Android phone.
By using Avast Mobile Security in your Android phone, your cell phone will be protected by virus, threat, hacker, even it’s able to minimize your loss if your Android cell phone is stolen. The antivirus component supports real-time protection and automatic updates. Updates can be configured to only be downloaded over certainProtect personal data with automatic virus scans and infected-URL alerts. Stop hackers by adding a firewall (rooted phones). Control anti-theft features with remote SMS commands for: history wipe, phone lock, siren activation, GPS tracking, audio monitoring, and many other useful tools.
types of connections and the interface can be protected with a password.
Call and SMS filtering can help device owners block annoying advertising calls or spam text messages. Users can define groups of phone numbers and configure the blocking intervals for them.The firewall component is only available for rooted devices because it requires special system-level access to enforce its rules. Device owners can use it to block individual applications from accessing the Internet over certain types of connections.
Wi-Fi Key Recovery
->You need root to use this application.
->You need to have connected to the network in the past.
-> This app cannot "hack" into an unknown/new network.
Have you ever forgotten the password of your home WiFi network, or the one you setup for your parents a few months back?
This application will help you recover the password of a wireless network you have connected to with your device in the past.
You can then either tap on an entry to copy it, or export the list to SD, or share it using the standard Android sharing facilities.
It does not crack the network, or use the MAC/SSID address to deduce the password. It simply reads it from the device itself.