Hi Friends in this Blog i will discus about top 10 androids apps that turn your phone into a hacking device. You will use that apps yo secure your privacy and your information from hackers.
Note: This information just for educational purposes. I don’t take you permission to use this for illegal purpose. If you face any problem we do not responsible for any thing.
These are the top 10 Android Apps That Turn Your Phone into a Hacking Device.
Spoof App is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. You use this app to record someone call if he want to blackmail you this app amazing for this purpose. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.
The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A DDoS attack uses more than one unique IP address or machines, often from thousands of hosts infected with malware.
Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks. FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.
It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK)
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyses the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection
5.Anti-Android Network Toolkit
ZANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.
SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).
Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router. WiFi Analyzer is a tool that allows you to analyze the WiFi networks around you. You can find out about the quality of the signal and the saturation of the network in barely five seconds.
Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security. Network Discovery lets you use your Android to scan your WiFi networks and audit their security as well as discover if there are intruders connected to it. If you need to audit the security of your WiFi network, you can use a tool like Android Network Discovery. With Android Network Discovery, you will be able to discover all the hosts of your WiFi network and scan the ports of each one of them. Android Network Discovery is a tool that you can use to find out if someone is connected to your network without authorization.
ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers. Its ultimate goal is to create a secure connection through which you can use a shell on a remote machine and transfer files back and forth to your phone
Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assessments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc,