Requirements: Android 2.2+
Anti consists of 2 parts: The Opposing edition itself and long plugins. Upcoming updates gift add functionality, plugins or vulnerabilities/exploits to Anti.
Using Opposed is very illogical - on each run, Opposed faculty map your network, picture for athletic devices and vulnerabilities, and give display the information accordingly: Chromatic led signals an 'Overactive device', Yellowish led signals "Acquirable ports", and Red led signals "Danger constitute". Also, apiece figure module human an icon representing the write of the pattern. When fattening scanning, Opposing testament food an reflexive story specifying which vulnerabilities you jazz or bad practices victimised, and how to fix apiece one of them.
Erst Anti has mapped your textile, it is term to choose the assault method:
[+] Icon - This instrument interpret the chosen place for give ports and vulnerabilities, also allowing the human to select a unique scanning book for a author advanced/targeted construe.
[+] Spy - This leave 'sniff' images transferred to/from the designated pattern and exhibit them on your phone in a good room layout. If you take a mesh subnet/range as place, then all images transferred on that cloth - for all adjunctive devices - gift be shown. Other lineament of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the underside drawer.
[+] D.O.S - This will venture a Forswearing Of Mating (D.O.S) for the elite take, ie. it testament contain them any boost reach to the internet until you move the criticism.
[+] Succeed images - This gift follow all images transferred to/from the place with an Opposing trademark, thusly preventing from attacked victimised perception any images on their browsers piece the eat the cyberspace, object for a overnice looking Anti logotype...
[+] M.I.T.M - The Man In The Mid onslaught (M.I.T.M) is an late criticism victimised mainly in combination with new attack. It allows invoking specialised filters to cook the scheme data. Users can also add their own mitm filters to create more mitm attacks.
[+] Onslaught - This leave cause a danger flack using our Cloud copulate against a proper place. Once executed successfully, it gift accept the operation to interact the design remotely from your sound.
[+] Papers - This leave create a vulnerability interrogatory with findings, recommendations and tips on how to fix saved vulnerabilities or bad practices victimized.
This is the Prize version which supports the shadowing:
Scanning
OS Detection*
Traceroute
Port Insert
WIFI Monitor
HTTP Server
Man-in-the-middle
Device Exploits
Plugins
Opposed supports & uses the followings OSS tools :
nmap
Ettercap
driftnet
THC-Hydra
Metasploit
Seem take to gap this to unlock Golden or Platinum edition.
Anti consists of 2 parts: The Opposing edition itself and long plugins. Upcoming updates gift add functionality, plugins or vulnerabilities/exploits to Anti.
Using Opposed is very illogical - on each run, Opposed faculty map your network, picture for athletic devices and vulnerabilities, and give display the information accordingly: Chromatic led signals an 'Overactive device', Yellowish led signals "Acquirable ports", and Red led signals "Danger constitute". Also, apiece figure module human an icon representing the write of the pattern. When fattening scanning, Opposing testament food an reflexive story specifying which vulnerabilities you jazz or bad practices victimised, and how to fix apiece one of them.
Erst Anti has mapped your textile, it is term to choose the assault method:
[+] Icon - This instrument interpret the chosen place for give ports and vulnerabilities, also allowing the human to select a unique scanning book for a author advanced/targeted construe.
[+] Spy - This leave 'sniff' images transferred to/from the designated pattern and exhibit them on your phone in a good room layout. If you take a mesh subnet/range as place, then all images transferred on that cloth - for all adjunctive devices - gift be shown. Other lineament of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the underside drawer.
[+] D.O.S - This will venture a Forswearing Of Mating (D.O.S) for the elite take, ie. it testament contain them any boost reach to the internet until you move the criticism.
[+] Succeed images - This gift follow all images transferred to/from the place with an Opposing trademark, thusly preventing from attacked victimised perception any images on their browsers piece the eat the cyberspace, object for a overnice looking Anti logotype...
[+] M.I.T.M - The Man In The Mid onslaught (M.I.T.M) is an late criticism victimised mainly in combination with new attack. It allows invoking specialised filters to cook the scheme data. Users can also add their own mitm filters to create more mitm attacks.
[+] Onslaught - This leave cause a danger flack using our Cloud copulate against a proper place. Once executed successfully, it gift accept the operation to interact the design remotely from your sound.
[+] Papers - This leave create a vulnerability interrogatory with findings, recommendations and tips on how to fix saved vulnerabilities or bad practices victimized.
This is the Prize version which supports the shadowing:
Scanning
OS Detection*
Traceroute
Port Insert
WIFI Monitor
HTTP Server
Man-in-the-middle
Device Exploits
Plugins
Opposed supports & uses the followings OSS tools :
nmap
Ettercap
driftnet
THC-Hydra
Metasploit
Seem take to gap this to unlock Golden or Platinum edition.
Download:
Mirrors:
For More Info Visit: http://www.zimperium.com/Android_Network_Toolkit.html
FREE DOWNLOAD