Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked [APP] Anti (Android Network Toolkit)


steambag

Recommended Posts

This is the hidden content, please

 

Android Network Toolkit - Anti - Universal app. Network scanner, sniffer, MITM, Remote Exploits!

Expandable functionality through plugins.

 

Anti displays a map of your network, scan for active devices and vulnerabilities, and displays relevant information: green LED signals the active devices, yellow - on the available ports and red - the found vulnerabilities. In addition, each device will have an icon indicating the type of device. After the scan is complete, Anti generate automatic report showing your existing vulnerabilities or bad practices used, and suggest how to fix each one.Once Anti analyze your network, you can select the method of attack:Scan - will scan the selected target for open ports and vulnerabilities.

 

[video=youtube;tKW-XV59-gk]

 

Once Anti (Android Network Toolkit) analyze your network, you can select the method of attack:

 

Scan - will scan the selected target for open ports and vulnerabilities. You can also select a specific script for a more advanced / targeted scan.

Spy - packets sent from / to the selected device will be intercepted and displayed on your phone in a handy gallery. If you choose as the target subnet / range, it will display all traffic on the network packets to all connected devices. Another feature of the plug-Spy is the interception of web sites and unprotected (not HTTPS) logins / passwords that are displayed in the lower area.

DOS - the selected target will be subject to DoS-attack in which their access to the Internet will be either impossible fully or substantially impeded.

Replace images - all images transferred to / from the target, the logo will be replaced by Anti, thus preventing the display of any image in the browser when browsing the Internet, except for the nice looking logo Anti ...

MITM - target will be subject to attack, "the man in the middle", which is an advanced attack used mainly in combination with other types of attacks. This allows you to use special filters to manipulate the data transmitted over the network. Users can also add your own filters MITM, to create an even more MITM attacks.

Attack - will be initiated attack soft targets using our cloud service. In case of a successful action, it allows you to control the device remotely from your phone.

Report - will generate a report on vulnerabilities with conclusions, recommendations and tips to deal with the found vulnerabilities or bad practices used.

 

Download:

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.