Selasa, 29 Mei 2012

Anti v1.0 (Android Network Toolkit) Full APK

Requirements: Android 2.2, Root recommended
Overview: ZImperium "Anti" LTD is proud to annonce Android Network Toolkit - Anti.
Anti consists of 2 parts: The Anti version itself and extendable plugins. Upcoming updates will add functionality, plugins or vulnerabilities/exploits to Anti.
Using Anti is very intuitive - on each run, Anti will map your network, scan for active devices and vulnerabilities, and will display the information accordingly: Green led signals an 'Active device', Yellow led signals "Available ports", and Red led signals "Vulnerability found". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how to fix each one of them.
Once Anti has mapped your network, it is time to choose the attack method:


[+] Scan - This will scan the selected target for open ports and vulnerabilities, also allowing the user to select a specific scanning script for a more advanced/targeted scan.
[+] Spy - This will 'sniff' images transferred to/from the selected device and display them on your phone in a nice gallery layout. If you choose a network subnet/range as target, then all images transferred on that network - for all connected devices - will be shown. Another feature of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the bottom drawer.
[+] D.O.S - This will cause a Denial Of Service (D.O.S) for the selected target, ie. it will deny them any further access to the internet until you exit the attack.
[+] Replace images - This will replace all images transferred to/from the target with an Anti logo, thus preventing from attacked used seeing any images on their browsers while the browse the internet, except for a nice looking Anti logo...
[+] M.I.T.M - The Man In The Middle attack (M.I.T.M) is an advanced attack used mainly in combination with other attack. It allows invoking specific filters to manipulate the network data. Users can also add their own mitm filters to create more mitm attacks.
[+] Attack - This will initiate a vulnerability attack using our Cloud service against a specific target. Once executed successfully, it will allow the attack to control the device remotely from your phone.
[+] Report - This will generate a vulnerability report with findings, recommendations and tips on how to fix found vulnerabilities or bad practices used.

This is the Silver version which supports the following:
Scanning
OS Detection*
Traceroute
Port Connect
WIFI Monitor
HTTP Server
Man-in-the-middle
Remote Exploits
Plugins

Anti supports & uses the followings OSS tools :
nmap
Ettercap
driftnet
THC-Hydra
Metasploit


Download Instructions:
http://depositfiles.com/files/shr65zrmo
http://www.filefat.com/evd3y4en8lje
http://www.multiupload.com/GO482DMOC1



Note:Please visit market for better description, Content represent here for informational or educational purpose only 

Tidak ada komentar:

Posting Komentar

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Disclaimer : androappstoday.blogspot.com does not store any files posted on its website. All files are hosted and created by third party and make it available in the internet.All information in this website are provided for educational and testing purposes only. All images, appliations and other related materials posted in this site belongs to its rightfull owner and remains the copyright.By entering this website, means that you agree with the above conditions.All games,Apps, and other resources in this blog are reproduced from the Forum or blog.
Support (DMCA): It a policy for androappstoday.blogspot.com to respond to any notice of alleged copyright infringement. If you are the rightfull owner of the material used by and you believe that your intellectual property rights has been infringed. We request you to send any and a proper notification. We apologize for any kind of misuse of your material in our website. No files are hosted on this server: this is a searchengine, indexing posts from all over internet. All links to other websites come via google. Digital Millennium Copyright Act.