Mobile Hacking Tools

AnDOSid: DOS Tool For Android Mobile

andosid

AnDOSid is designed for security professionals only!

AnDOSid tag’s posts with two unique numbers which relate to the Android device that sent the request.

AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.

AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.

A new product released by SCOTT HERBERT for Android mobile phones,Its AnDOSid – the DOS tool for Android Phones. The rise of groups like Anonymous and LuzSec, as well as constant India / Pakistan cyberwar has raised the issue of cyber-security higher in the minds of web owners.

Pentesting tools exist to simulate such attacks and help website security people defend against them, however for the most part they currently only exist for desktop computers. Mobile phones have, over the last few years, grown from simple devices that send and receive calls to mobile computing platforms which can be purchased for less than $100 a device.

AnDOSid fills that gap, allowing security professionals to simulate a DOS attack (An http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.

AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.

What’s in this version:

  • Requires Internet access to send the http post data
  • Requires phone state to access the IMEI (one of the two identifiers sent with each post)

AnDOSid can be downloaded from the Android Market place and costs just £1 or Rs.74.58/-Only.

More Info


Spoof Tooph 0.5: To Automate Cloning of Bluetooth devices

spooftooph

SpoofTooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specifically the same Address).

Change Log v0.5:

– Fixed segmentation fault in manual assigning of Device Name and Class of Device
– Modified flags
– Depreciated
-r: Assign random NAME, CLASS, and ADDR
-l : Load SpoofTooph CSV logfile
-d : Dump scan into SpoofTooph CSV logfile
– New
-w : Write to CSV file
-r : Read from CSV file
-R: Assign random NAME, CLASS, and ADDR
-m: Specify multiple interfaces during selection
-u: USB delay. Interactive delay for reinitializing interfaces

Download

Join Our Club

Enter your Email address to receive notifications | Join over Million Followers