[APP][ROOT][4.1+] Network Utilities - Android Apps and Games

This programm make for IT specialists. App may be used to study network protocols and search for known vulnerabilities on your network. Includes tools for working with network security auditing, view and analyze network traffic. In the description on the Market, I had to keep quiet about most features of the program
For correct operation of the program, you must have ROOT permissions.
IMPORTANT:
at version 7.4.0 and higher security audit functionality no avaliable in start. If you want use ARP spoofer, http sniffer,... create folder /sdcard/Android/data/com.myprog.netutils before first launch. Or clear app data and create folder if you launch it.
Starting with 7.5.0 the security audit functionality is unlocked as follows: open the settings and 20 times tap to label 'Settings'.
The program includes:
-IP Discover
-ARP Cache viewer
-Ping
-Traceroute
-Port Scanner (7 supports scanning methods)
-Dos Attack
-ARP Spoofer
-Sniffer
-HTTP Sniffer
-Browse Attack
Additional functions:
IP Calculator
DNS Resolver
Help with a detailed description of all functions
Link on Google Play: https://play.google.com/store/apps/details?id=com.myprog.netutils

New version.
Browse Attack replaced Network Spoofer
Using Network Spoofer you can: spoof files, images, web pages on victim browser
Setting the console font
And much more))

downloading right now. will post my input later.
thanks fort sharing
---------- Post added at 03:50 AM ---------- Previous post was at 03:31 AM ----------
k tried it and all the tools seems to be working.
just 1 UI issue, the buttons on top-right dont have any title/text when you hold your finger on them. other than that its a good tool.

woomera,
About "text when you hold your finger on button": I just started to update UI, thanks for your remark.
For version 7.0, I plan to bring to mind the interface.
If you have any suggestions for interface/functionality, please write to this topic.

Version 7.0 on Google Play
Update UI

Version 7.0.1 on Google Play
-Built-in browser with Cookie Manager.

I tried the dos attack one..i mean i just clicked on dos on the side bar (didnt pressed any button after that)
Did i did something illegal?
May be i should stay away...

doctor_droid,
It must work..
But Dos attack only floods victim and present in the program more to the collection.. If you start the packet sniffer after dos, you can see that.
More details can be found in the help

First Row said:
doctor_droid,
It must work..
But Dos attack only floods victim and present in the program more to the collection.. If you start the packet sniffer after dos, you can see that.
More details can be found in the help
Click to expand...
Click to collapse
I meant did i initiated any dos attack? I clicked nowehere except on the sidebar dos text... M worried :/ being a dentist thats too difficult to understand. Sorry for being so noob abt such a good app..will read help first..

doctor_droid,
If you only open Dos attack, it no started.
For start you must set addreses of victim/attacker(or use random, stay it as default) and press start.
Sorry if i'm not understand correct your problem

First Row said:
doctor_droid,
If you only open Dos attack, it no started.
For start you must set addreses of victim/attacker(or use random, stay it as default) and press start.
Sorry if i'm not understand correct your problem
Click to expand...
Click to collapse
Got it now thanks ...i was worried...
Have one of my friends studying computer science...he would be delight to know abt this app...
Keep up the good work sir

Version 7.1 on Google Play
New hex viewer on packet sniffer

Version 7.2 on Google Play
-Built-in file manager

Version 7.2.1 on Google Play
The ability to execute command for modify request/response on Network Spoofer.
the path to the "intermediate" request/response: /sdcard/Android/data/com.myprog.netutils/network_spoofer/scr/
Files of request/response:
/sdcard/Android/data/com.myprog.netutils/network_spoofer/scr/request
and
/sdcard/Android/data/com.myprog.netutils/network_spoofer/scr/response
Example command: echo Hello > /sdcard/Android/data/com.myprog.netutils/network_spoofer/scr/response
and activate "Resp scr"

Version 7.3 on Google Play
-The ability to copy the built-in Hex viewer
-Small fixes

Version 7.3.5 on Google Play
-Update UI (all dialogs)

New version on Google Play
-New utilitie - Netstat
-Hex viewer in Sniffer updated
IMPORTANT: at version 7.4.0 and higher security audit functionality no avaliable in start. If you want use ARP spoofer, http sniffer,... create folder /sdcard/Android/data/com.myprog.netutils before first launch. Or clear app data and create folder if you launch it.

Version 7.4.2 on Google Play
-Possibility set icmp data size in ping
-Update UI

Version 7.4.3 on GP
Subnet scanner was added
IP discover work faster (multithread name resolving and vendor by mac loockup)

Version 7.4.5 on GP
Update help
Posiblity set timeout on port scanner

Related

[APP][2.2+] LBE Security Master 5.1.4722

For those who use this app, and like it more than the official lite English version.
Attached is the latest (beta) Chinese version Google English translated and repacked+signed.
All rights/Credits to creator at: www.lbesec.com
For older versions check this thread.
Or check market.
Note:
I have experienced issues with apps's functionality if it's not installed from clean slate. Even when using backup/restore functionality of LBE or TitaniumBackup.
I strongly recommend uninstalling previous versions before upgrading and to reconfigure the app from scratch.
Changelog:
10/11/2013 - The community here updated the translations for LBE_Security_5.1.4722
31/07/2013 - LBE 5.0.3720
16/07/2013 - LBE 5.0.3674 - Thanks to @sorg
28/06/2013 - LBE v5.0.3555 - A more Humanoid translation thanks to VicePoint can be found here.
23/05/2013 - LBE v4.6.3005
28/04/2013 - LBE v4.6.2925
26/04/2013 - LBE v4.6.2924
19/04/2013 - LBE v4.5.2917
06/02/2013 - LBE v4.4.2868
25/01/2013 - LBE v4.4.2829
24/01/2013 - LBE v4.4.2828
19/01/2013 - LBE v4.4.2803 - A release with multiple translations for English, French & German. Look here.
Newer modifications were added and attached here by Pax_fr.
14/01/2013 - LBE v4.4.2803 - here
14/12/2012 - LBE v4.3.2738 - here
16/11/2012 - LBE v4.2.2548 - Manual Translation - here
Should be fixing the Android 4.2 issues that reported in previous version.
14/11/2012 - LBE v4.2.2546 - Manual Translation - Here
21/09/2012 - Newer release from LBE - v4.1.2224 - Here
7/9/2012: A new version is out - v4.1.2175
Until we'd get to human translate the changes I'm posting the translations by Google Translate.
Update (21/09): Human/Manual translation version thanks to cdljl2005
Here's the change log (thanks to Google translate):
1 redesigned clean and simple style UI
2 new program lock function, face recognition
3. The new LBE task manager, at any interface can be a key to exhale, convenient
4 New switched vibration and missed reminders
5 Enhanced system-level call blocking feature, support for CDMA network phones, and HTC series mobile phone
6 new strange call delay of three seconds ringing function (This feature is dependent on system-level calls blocking)
7 spam messages and telephone notification, a separate notification bar message, you can just click once to enter the harassment intercept interface
8 Task Manager with HTC 4.0 phone compatibility
9. Significantly optimize memory usage, reduced to LBE 4.0 version level
10. Repair the charging time remaining prompts
11 to increase the depth of the SD card cleanup options
12. Repair Most common LBE Security Master 4.0 bug fixes some bug causes the program to crash
** Thanks to cdljl2005, we now have a manual translation for v4.0.1894.
If you like it give him a thanks too.
25/7/2012 - update translation to v4.0.1894 (Google translated)
4.0.1894 update logs
Active defense Added support for Android 4.1.1
The new revision of the main interface, more comfortable, more easy to use
The harassment blocking features full support for dual card dual standby type. You can set a different intercept for each SIM card mode and IP dialing mode
New design of software architecture, the memory footprint is reduced by 40%, half and even less of the same kind of security software
New depth of scanning capabilities, can help you to accurately scan the SD card in the garbage
Fixed clean up the desktop process error on Android 4.0 and 4.1 mobile phones
New notification bar shortcuts, so you do not need to enter the the LBE security master to complete the most common operations
Synchronization software uninstall feature new uninstall the software clean up the residual files of SD card
Traffic statistics to support the night half-price mode, you are free to set the half-period
Virus killing function supports background scanning, to avoid the depth of killing screen lock failure
Harassment intercept support dual card models include: the MOTO full range of dual-card models, HTCG + W card models, MTK full range of dual card models, ZTE U960, etc.
23/5/2012 - update translation to v3.7.2164 (seems lke there's a hardcoded chinese text in power saving screen, around the power scheme... )
Active defense:
0, fixes some versions prompted to restart the upgrade several times
A fix on some machines, the main anti-occasional failed to load;
2, FMR-compatible memory clean-up, hot restart and other software., Active defense can be automatically restored after a system crash;
To streamline the logging algorithm, the same event will not be multiple entry log;
Power-saving mode:
1, reconstruction of the power-saving optimization features: a variety of modes, charging tips, taskbar power icon (optional);
2, the power to show the accuracy on some devices;
3, repair N930 battery display inaccurate;
4, fix the first to enter the power saving mode, custom mode displays an error;
5, modify the name and description of the mode;
6, improved battery power for algorithms;
Flow correction:
Fix a bug, resulting in an automatic flow correction will be performed after each reboot;
Anti-theft features:
Two unlock failure complicated by the front camera camera sent to the safety of mobile phones
This feature requires ANDROID 2.3, and the phone has a front camera
Other:
Repair and the MIUI 2.3 backup and restore compatibility issues.
11/05/2012 - update translation to v3.6.2039
The new flow auto-correction function, support automatic and manual correction mode; automatic correction of repair traffic occasionally lead to software crashes, and flow calibration time interval too short;
Automatically upgrade the support to upgrade the anti-theft module;
Fix the problem of anti-theft module messages intercepted by the security master;
Anti-theft module:
A backup contact data is no longer the backup picture and other data, to prevent the backup failed because the data is too large lead
When the backup, positioning operation is executed, it will automatically open the network connection and GPS
The interface-digit password prompt, to prevent excessive password median
4 anti-theft login page to join the forgotten password option
29/04/2012 - update translation to v3.5.1999
a new anti-theft module
Enhanced the compatibility of the active defense
New anti-theft module, anti-theft module is an independent security master module, with the following features:
Automatic notification when the SIM card replacement security number phone positioning: Get cell phone current location data destruction: destruction of the address book, SMS, data, and clean up the SD card, to prevent the loss of privacy data backup: backup data to the cloud server, to prevent key card replacements notice: loss of data lock the phone: to prevent others from using your phone rings alarm: the maximum volume alarm sound to help retrieve the phone virtual Warning: send a custom warning message to your phone
Anti-theft module is tightly integrated with the LBE security master, support ROOT installation mode in the active defense to open the case, the LBE anti-theft module. LBE anti-theft module in this mode will be installed as a system component that can not be easily removed, even if the phone is clear the data, or restore factory settings, anti-theft module can still take effect.
19/04/2012 - update to v3.4.1974
enhance the compatibility of the active defense
- Repair the compatibility problems of the previous versions of the firmware of a small part of active defense
- Repair the failure of some of the Android 2.1 or Android 2.0 phone in the open active defense, the Task Manager
- Repair the in MIUI on the automatic update fails
- Improve the same part of the proactive defense without the phone features of the tablet device compatibility issues
- Repair of active defense compatibility issues with some of CyanogenMod ROM
- Added by default some of the core of the system component from the Kai housekeeper whitelist, to prevent the user inadvertently prohibit its start automatically lead to the abnormal working of the system (including: the MOTO phone can not connect to the PC, some ringtones error)
- New anti-virus log function, you can viewed in the interface of the virus killing virus scanning history
11/04/2012 - update to v3.3.1946
Change log is huge, read here
29/02/2012 - update to v3.2.1749
One fixes a large number of bug cause crash
Firewall support Samsung I9008 and I9108
3 virus database upgrade to the latest version of February 24, 2011 (20110224.d)
New Kung Fu Panda virus detection
5 fixes the Kung Fu Panda virus infection on the phone security master black screen no response
20/02/2012 - v3.2.1741 google translated (file named by author as 3.2.r741)
Bug fixes
Firewall support 9008 9108
Virus database upgrade to the latest version of the February 20
18/02/2012 - Fixed FCs on scan due to translation.
Changelog here:
http://www.lbesec.com/?cat=3
Google translated version:
http://translate.google.com/transla...ayout=2&eotf=1&u=http://www.lbesec.com/?cat=3
Terrible translation, did you edit the text yourself?
SWADED said:
Terrible translation, did you edit the text yourself?
Click to expand...
Click to collapse
Read OP again. Clearly states how translated.
Sent from my HD2
zagzag99 said:
Read OP again. Clearly states how translated.
Sent from my HD2
Click to expand...
Click to collapse
Read comment again. Clearly states edit instead of translated.
But let me make it even clearer: Did you just copy paste what you saw in Google translate or did you edit the text after letting Google **** it up?
Don't get me wrong I appreciate the effort but you could make the translation so much better by just using common sense.
I'm willing to translate it for you, if you can send me the text file or whatever.
SWADED said:
Read comment again. Clearly states edit instead of translated.
But let me make it even clearer: Did you just copy paste what you saw in Google translate or did you edit the text after letting Google **** it up?
Don't get me wrong I appreciate the effort but you could make the translation so much better by just using common sense.
I'm willing to translate it for you, if you can send me the text file or whatever.
Click to expand...
Click to collapse
meant Google translated. Not manual edit apart from some special chars.
Have no time to translate manually. There are many strings. If you want you can extract strings yourself with apktool.
Or I can attach later if you want.
Sent from my HD2
Hi zagzag
I don't seem able to find the download link to 3.1.1549 version on lbesec.com. Since this version is recommended I would like to give it a try. Any chance you can attach it to the op please? Thanks in advance.
Link: http://www.lbesec.com/download/LBE_Privacy_Guard_3.1.1549_A1.apk
It's where the android button is.
CSharpHeaven said:
Hi zagzag
I don't seem able to find the download link to 3.1.1549 version on lbesec.com. Since this version is recommended I would like to give it a try. Any chance you can attach it to the op please? Thanks in advance.
Click to expand...
Click to collapse
night_stalker_z said:
Link: http://www.lbesec.com/download/LBE_Privacy_Guard_3.1.1549_A1.apk
It's where the android button is.
Click to expand...
Click to collapse
Thank you for the link. Unfortunately, this one is in chinese language. I'll wait for the English version.
By the way, a general comment about the LBE's saga...
I think the efforts to improve the application should be seen as a positive thing. I've got a feeling I can trust the LBE's developer(s). A bit unfortunate no one in the development team is fluent in English. Kaspersky security software product is developed in Russia, so the location of the developer/vendor means nothing really.
Still on the matter... There are more people in the UK in prisons than the hackers in China who are after my credit cards. That doesn't make all British people criminals.
Updated OP with newer version.
zagzag99 said:
Updated OP with newer version.
Click to expand...
Click to collapse
Thank you.
Here is my very quick feedback...
The number of new features are very impressive.
Everything is configurable to your liking.
I have monitored the two main processes using OSMonitor app and couldn't detect anything suspicious. Since I disabled all reporting services I did not notice LBE making network connections.
After install I restarted the phone, it was an requirement.
I have checked the applications that would connect to the internet to pull adverts and as far as I could tell LBE was blocking them successfully.
The process usage has always been impressive in version 2 and I can say the same thing about 3 now. Please note; I use my phone extensively everyday and I use upto three batteries. I can easily tell if my battery usage has noticeably changed. Each battery gives me 6-9:30 hours of continuous use.
The interface looks really good and very distinguish from the rest.
Being still in alpha obviously, the interface requires a lot of attentions. For instance, going back to the app list of Active Defense from individual app setup screen does not maintain the application position. Things become bad when the system apps being shown.
It looks like the trusted app view is gone, which is a step backward in terms of usability.
Ok, I need to submit this now as my bus stop is next. Overall I'm very pleased with LBE so far. Thank you guys.
thanks for this!
Just a quick update...
I'm still alive after installing the latest build but unfortunately it was unstable -- reverted to version 2.x now.
Just a suggestion, if I may. Due to the number of new features I can tell how the team/dev are/is busy. However, it would be a good plan to fix version 2.x issues first. I just reverted to a version that I knew is not stable. For one, I have to keep my eyes on the settings to make sure they are not changed inappropriately. Thank you.
Thanks, best program I have installed. Just brilliant
So what's the difference between "LBE Security Manager" and "LBE Privacy Guard", if I may ask?
trollsperm said:
So what's the difference between "LBE Security Manager" and "LBE Privacy Guard", if I may ask?
Click to expand...
Click to collapse
It is the same only the version posted here is the newest beta, translated by the OP.
Not a big fan of it being able to do things that cost me money. Why is that permission there now?
Sandpapers said:
Not a big fan of it being able to do things that cost me money. Why is that permission there now?
Click to expand...
Click to collapse
That's how the permission is called but the feature behind it is that lbe can track your data plan costs and limit apps using data when you reach your limit.
This is good for those that don't have flat rate unlimited data plans.
Sent from my NexusHD2
New release 3.2.1650
Again, just google translated.
Check OP for link.
Change Log:
The LBE security master 3.2 full version (3.2.1650) is officially released! Increase the depth of clean-up of SD card, IP dialing
Virus killing] new ROOT mention the right type of software alarm
The virus killing anti-virus interface, you can view the details of each virus, including: the name of the virus, the risk of specific acts
Open the antivirus engine and virus database of killing the virus automatic update feature
[Interface] New security master password protection feature to prevent users without permission to modify the security master set
[Interface] support the flow of floating window click on the penetration function (need to lock the flow of floating window location)
Call firewall new system-level calls firewall, a significant reduction in call blocking time, the loud cry of resolve to intercept (system-level calls firewall needs to open the active defense capabilities to meet the call blocking mode is set to hang up when best)
Phone call firewall intercept model to add only accept contact with the White List number model
Call Firewall support calls attribution to feature HTC Sense 3.0 lock screen display (requires first set of calls attribution to the window position to lock)
[Coming call firewall support MMS block and recovery
Call firewall, support IP dialing, you can choose to automatically add all the numbers to IP prefixes, the only other provinces, the only foreign city numbers automatically add IP prefix
Call firewall attribution to the database is updated to the January version
[System] new deep cleaning function of the SD card, you can manually clean up the SD card on a variety of software cache
Android 4.0] to repair the Android 4.0 system, occasional failure of network access control
[Performance] fix bugs, and after two weeks of internal testing to ensure the stability of the 3.2 version from 3.0 since

[APP][2.2+] Server Auditor SSH client with easy navigation

Hello,
ServerAuditor application is available on Google Play now (https://play.google.com/store/apps/details?id=com.server.auditor.ssh.client). We released it a couple of days ago. We are linux developers mostly and sometimes would like to have remote access through remote devices. This is initial release and more features are coming. Client is implemented from scratch and it isn't a clone of some opensource SSH client implementations.
We appreciate any feedback which would have to make our application easier to use as we believe it is possible to have convenient mobile SSH client.
Version 1.4
It's been a while since my latest update. Now we completely reworked the UI and added several features like port forwarding. Please also note that an app has a new URL in the market.
Version 1.2
- Aliases are finally available.
- A lot of new cool color schemes.
- Incredible copy-paste implementation. Allows instant search of copied buffer in Google or Serverfault.
- A lot of bug fixes and improvements.
- Colours support and connection grouping
- SSH scripting and ability to execute one command on several servers for easy cluster managment
- Port forwarding
- Smart command and filesystem navigation (we aren't 100% sure how we will exactly implement this, so some tests needed, any ideas are appreciated).
Version 1.1
- Full xterm support
- Incredible improvement of the rendering speed!
- Close all connections functionality
- Various UI improvements
- New option 'Background connection's timeout'
- Hackers keyboard is supported
- Redesigned help page
- Bug fixes for certain Android devices
Version 1.0.2
- Crash on Nexus fixed
- Import keys functionality implemented
Version 1.0.1
- We tried to make access to control keys more convenient than in existing SSH clients
- Meta-actions (like shake for CTRL-C and Volume buttons are used).
- Easy connection and keys management.
- Gestures like swipe up/down/left/right are used for replacing corresponding terminal buttons.
We would like to know which features by your opinion are most important and shortcomings of current version
Thank you for your time!
Dmitriy.
Please check for new update.
BEST ssh client out there! Much better, much more up to date than Connectbot.
Thanks, Jewremy!
We have just published Server Auditor in Amazon app market (http://www.amazon.com/Crystalnix-Se...qid=1344677892&sr=8-1&keywords=server+auditor).
Are there any plans to support Tasker and/or Intents, so the SSH client can be launched, connected before Tasker (or any other automation program) launches a task? Being able to disconnect and close the client would be crucial as well (this last part is something ConnectBot can't handle afaik).
Hi, ppc_dan.
We are going to release next version with support of terminal colors soon. At the moment we have several feature requests (like scripting support, grouping, etc). Thank you for your suggestion, I think we will try to implement Tasker support within our scripting support task.
ServerAuditor has gained a huge update. Please find the most significant changes below:
Version 1.1
- Full xterm support
- Incredible improvement of the rendering speed!
- Close all connections functionality
- Various UI improvements
- New option 'Background connection's timeout'
- Hackers keyboard is supported
- Redesigned help page
- Bug fixes for certain Android devices
Enjoy!
This is a great app. My only suggestions are to add the ability to use aliases. It would be nice since a lot of my connections are also remote connections with a FQDN so they all look the same but the port.
Also I'm trying to add keys but i cant seem to figure it out. I have tried to attach both a public key and a private key. (created by puTTy) with no success.
Thanks again for the app.
pman860507 said:
Also I'm trying to add keys but i cant seem to figure it out. I have tried to attach both a public key and a private key. (created by puTTy) with no success.
Click to expand...
Click to collapse
I have the same problem. I've imported a private key that is in OpenSSH format and attached it to a connection. Authentication fails and falls back to asking for password. The same key works great when using Bitvise on my laptop.
/Relnah
Might have to do with version of Android. My original HTC Desire with 2.2 won't work. But my Transformer with 4.x works with the exact same key.
/Relnah
pman860507 said:
This is a great app. My only suggestions are to add the ability to use aliases. It would be nice since a lot of my connections are also remote connections with a FQDN so they all look the same but the port.
Also I'm trying to add keys but i cant seem to figure it out. I have tried to attach both a public key and a private key. (created by puTTy) with no success.
Thanks again for the app.
Click to expand...
Click to collapse
Thanks! New release will be available soon and aliases are already available. We had a lot of responses about keys and will try to fix all issues.
relnah said:
I have the same problem. I've imported a private key that is in OpenSSH format and attached it to a connection. Authentication fails and falls back to asking for password. The same key works great when using Bitvise on my laptop.
/Relnah
Click to expand...
Click to collapse
Could you please let us know which application have you selected while importing this key (which file manager I mean)?
New version 1.2 with a huge update!
- Aliases are finally available
- A lot of new cool color schemes.
- Incredible copy-paste implementation. Allows instant search of copied buffer in Google or Serverfault.
- A lot of bug fixes and improvements.
Great work. I still cant get keys to import, but i love the aliases. It always says invalid filetype. Keep it up. This is test best ssh app available.
dlyfar said:
Could you please let us know which application have you selected while importing this key (which file manager I mean)?
Click to expand...
Click to collapse
I'm using either the file manager or ghost commander.
I'm trying to import a private key.
Sent from my SAMSUNG-SGH-T989 using Tapatalk 2
Port Forwarding
in the OP it says that Port Forwarding is possible.
Can someone explain how I do this? I can't find the setting anywhere...
thanks!

[APP][2.3+] JuiceSSH - Free SSH Client

For the last six months we've been working on an SSH app and after a lot of hard work and sleepless nights coding - we've hit publish on the Play Store!
As a pair of full-time linux based systems administrators we spend our lives inside SSH sessions, looking after a large number of servers in and out of office hours. Like most android users we used Connectbot and while it's awesome, we found ourselves getting frustrated with it's lack of functionality in areas and started writing an app that suited our needs better.
Over time our little SSH client grew and grew functionality-wise and JuiceSSH was born...
Play Store & Screenshots:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
http://play.google.com/store/apps/details?id=com.sonelli.juicessh
Features:
Full colour SSH terminal client
Popup keyboard with all those normally hard to find characters
Use the volume keys to quickly change font size
Click URLs to open in a browser
Copy & Paste within sessions
External keyboard support
Save / Share SSH transcripts to Dropbox/Evernote/Email & SD card
UTF-8 character support
Easily organise your connections by group
Homescreen shortcuts
Keep multiple SSH sessions running in the background
Seamlessly connect 'via' other SSH connections with one click
Immediate access when you open the app to your frequently used connections
Password & OpenSSH private key support
Two-factor SSH authentication (eg: Google Authenticator)
All keys & passwords encrypted on-device with AES-256 encryption
Identities (users/password/keys) are abstracted from connections. Instead of updating every connection when you change your password - just update the identity and any connections linked to it will use the new password/key.
Works out of the box with Ubuntu, RedHat, CentOS, Mint, Gentoo and all other flavours of Linux
zlib compression to improve SSH sessions on high latency connections
Pro Features (optional in-app purchase):
Integrate with Amazon AWS / EC2, synchronise connections and automatically group servers based on their class or security groups.
Securely keep everything in sync between multiple devices
Automated AES-256 encrypted backups of all of your connections and settings
A beautiful widget for fast access to either your frequently used connections, or a specific group (Android 3.0+).
Team collaboration. Share your groups of connections with team members and start working together instead of separately.
Handy snippets library for quick access to your frequently used commands
Dark, Light, Solarized Dark and Solarized Light terminal color themes. For an overview of solarized color scheme and why it rocks for terminal usage check out http://ethanschoonover.com/solarized
Security lock to automatically protect JuiceSSH after a period of inactivity
Coming Soon:
Port forwarding
File transfers ( SCP / SFTP )
WOL
We've only just released it a few days ago and are already building up quite a user base and have had some fantastic feedback so far.
Any comments / suggestions are more than welcome!
Changlog
1.3.3
- Added page up/down keys to popup keyboard
- Added port forwarding (pro feature)
- Connect to port forwards via widget
- Automatically open port forwards in browser
- Improved reliability of 'connect via' functionality
- Improved SSH agent forwarding support
- Auto-expand connection group if only one exists, or the 'All' group if none exist
- Terminal font readability improvements
- Don't CloudSync font size between devices (handy if you have phone & tablet with different DPI)
1.3.2
- Can now disconnect & reconnect from connection notification (ICS+)
- No longer uses/modifies WIFI_SLEEP_POLICY setting
1.3.1
- Fixed a rare SSH 'Authentication Cancelled by Server' issue introduced in 1.3.0
- Added line wrapping for long terminal lines and improved tmux/screen wrapping compatibility
1.3.0
- Added support for two-factor authentication (eg: Google Authenticator)
- Added support for keyboard-interactive authentication
1.2.8
- Better support for keys exported from Connectbot (PKCS#8)
- Improved external ALT key handling (AltGr for international keyboards)
- Fix for broken keys/symbols on devices with slide-out keyboards
1.2.7
- Security lock to automatically protect JuiceSSH after a period of inactivity (Pro only)
- Added ALT and Hide Keyboard items to the popup keyboard
- Fix for issue with 3rd party keyboards in landscape mode
- Optimised terminal resizing performance to remove lag
- Fix for crash when deleting snippets
- Fix for incorrect color in Solarized Light color scheme
- Fix for incorrect number of EC2 instances shown
- Fix for enter key not working in nano & mongo client
1.2.6
- Beautiful new widget for pro users (Android 3.0+)
- Fix for rare issue that caused battery drain
1.2.3
- Improved Asus Transformer keyboard handling
- Bugfixes including SSH connect timeout issue
1.2.2
- Ability to hide software keyboard
- UI Improvements for Samsung Touchwiz devices
- Improved failed connection handling
1.2.0
- Amazon AWS/EC2 integration - keep your connections in sync with your AWS account & instances.
- Function keys (F1-F12) now on popup keyboard
- Fixed bug in 'connect via' connections
1.1.5
- Big improvement in Xterm support/dynamic terminal resizing. Applications like htop and ncurses dialogs now work flawlessly.
- New terminal color themes: Dark, Light, Solarized Dark and Solarized Light
- Fix for Samsung devices that had unreadable buttons on the popup keyboard
1.1.4
- Fix for in-app purchases not being recognised
1.1.3
- Added zlib compression to improve SSH sessions on high latency connections
- Added setting to choose whether the popup keyboard shows above or below the terminal
- Made Settings menu easier to use for low resolution devices
- Fixed bug that caused crash on devices without Google Play Services
- Added support for ssh://<host>:<port> links and bookmarks
1.1.2
- Bugfixes when resizing/rotating terminal
- Homescreen shortcuts
1.1.0
- Save handy snippets that can be used anytime within SSH sessions
- Copy and paste within SSH sessions
- Share SSH session transcripts via Dropbox/Email/Evernote etc or save them to SD card
- Host key/fingerprint verification
- No longer forces new users to link app with a google account
1.0.7
- Optimised automatic dropped/failed connection detection
- Fixed a UTF-8 encoding issue with some characters
1.0.6
- Fixed crash in Google Play billing service that caused some purchases not to take affect
- Fixed issue on Honeycomb tablets that caused a crash when notifications were received
1.0.5
- Fixed problem that occasionally caused an error when resuming background SSH sessions
Excellent SSH client! The layout and functionality makes working on remote machines very easy and efficient.
I have one issue: In some instances the Enter/Return key is not recognised. One easy way to replicate this is by editing a file with nano and then attempting to save it. It just doesn't work.
Any ideas?
Thanks again for the wonderful app!
beanaroo said:
Excellent SSH client! The layout and functionality makes working on remote machines very easy and efficient.
I have one issue: In some instances the Enter/Return key is not recognised. One easy way to replicate this is by editing a file with nano and then attempting to save it. It just doesn't work.
Any ideas?
Thanks again for the wonderful app!
Click to expand...
Click to collapse
Hi,
Thanks for the kind feedback.
We are currently aware of an issue that specifically affects nano, where the enter key is not recognised.
We're looking into it and hopefully will have a fix included in an update soon.
Thanks!
Hi. I am having trouble using an RSA public key with juiceSSH. I know it's not Juice's fault, as I can't use the id_rsa.pub with connectbot either - just thought I'd ask here for any ideas as i'm stuck.
I generate the keys on a Win XP box, using openssh (the cygwin version). OpenSSH itself is running fine (I can connect using passwords). Here's the keygen output:
C:\OpenSSH\bin>ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/graeme/.ssh/id_rsa):
/home/graeme/.ssh/id_rsa already exists.
Overwrite (y/n)? y
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/graeme/.ssh/id_rsa.
Your public key has been saved in /home/graeme/.ssh/id_rsa.pub.
The key fingerprint is:
XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX [email protected]
I then copied the id_rsa.pub file to /sdcard on my galaxy note, and tried to add it to my existing identity in Juicessh. I chose "file Path" and after typing id_ the full file name id_rsa.pub appeared. I touched that to select it then hit "OK" but nothing happens. I can only leave this screen by hitting cancel. I then tried to paste in the contents of the file, and that is permitted. But, wehn I try to connect using it, juicessh says "invalid file".
I've regenerated the key a couple of times, always with same results. As I say, the same file is also rejected by connectbot ("problem parsing imported private key").
So it appears that ssh-keygen on my XP box is producing an invalid file format (but that seems wildly unlikely??). I wondered if it was a DOS->Linux file format issue (cr vs cr/lf) but I haven't seen anything online suggestign that a file format conversion is needed if copying keys from Windows to Linux?
How can I track down what's wrong & why?
_pigro_ said:
Hi. I am having trouble using an RSA public key with juiceSSH. I know it's not Juice's fault, as I can't use the id_rsa.pub with connectbot either - just thought I'd ask here for any ideas as i'm stuck.
I generate the keys on a Win XP box, using openssh (the cygwin version). OpenSSH itself is running fine (I can connect using passwords). Here's the keygen output:
C:\OpenSSH\bin>ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/graeme/.ssh/id_rsa):
/home/graeme/.ssh/id_rsa already exists.
Overwrite (y/n)? y
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/graeme/.ssh/id_rsa.
Your public key has been saved in /home/graeme/.ssh/id_rsa.pub.
The key fingerprint is:
XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX [email protected]
I then copied the id_rsa.pub file to /sdcard on my galaxy note, and tried to add it to my existing identity in Juicessh. I chose "file Path" and after typing id_ the full file name id_rsa.pub appeared. I touched that to select it then hit "OK" but nothing happens. I can only leave this screen by hitting cancel. I then tried to paste in the contents of the file, and that is permitted. But, wehn I try to connect using it, juicessh says "invalid file".
I've regenerated the key a couple of times, always with same results. As I say, the same file is also rejected by connectbot ("problem parsing imported private key").
So it appears that ssh-keygen on my XP box is producing an invalid file format (but that seems wildly unlikely??). I wondered if it was a DOS->Linux file format issue (cr vs cr/lf) but I haven't seen anything online suggestign that a file format conversion is needed if copying keys from Windows to Linux?
How can I track down what's wrong & why?
Click to expand...
Click to collapse
If your key is valid, the 'Smart Search' in JuiceSSH should find the key (regardless unix/windows line endings of where it is on your sdcard).
If it's not - then it does suggest your key is invalid.
The fact that when you paste in the key on your android device, it still shows as invalid suggests that it's more than just a line endings issue.
I'm afraid I don't have a windows box here to test with.
Can you confirm that the first line of your key contains -----BEGIN RSA PRIVATE KEY----- or -----BEGIN DSA PRIVATE KEY-----
Thanks
Hi, thanks for taking the time to have a look!
The private id_rsa file, which resides in ~home/graeme/.ssh on the XP box, has the -----BEGIN RSA PRIVATE KEY ----- header. The public id_rsa.pub simply has ssh-rsa at the start.
However I think I may be very confused. My need is to connect from my android phone over ssh to my XP "server" which is running openssh. I can currently do this using password authentication, and I want to use keys instead. I have generated public/private RSA keys using ssh-keygen on the XP box, and then copied the public key it generated onto the android phone and tried to import it.
Should I actually be generating the keys on the phone and then copying the public one to the PC? If so, what do I need on Android to do this (I'm not rooted).
_pigro_ said:
Hi, thanks for taking the time to have a look!
The private id_rsa file, which resides in ~home/graeme/.ssh on the XP box, has the -----BEGIN RSA PRIVATE KEY ----- header. The public id_rsa.pub simply has ssh-rsa at the start.
However I think I may be very confused. My need is to connect from my android phone over ssh to my XP "server" which is running openssh. I can currently do this using password authentication, and I want to use keys instead. I have generated public/private RSA keys using ssh-keygen on the XP box, and then copied the public key it generated onto the android phone and tried to import it.
Should I actually be generating the keys on the phone and then copying the public one to the PC? If so, what do I need on Android to do this (I'm not rooted).
Click to expand...
Click to collapse
Ahh ok - makes more sense now.
You need the private key on the phone (id_rsa).
The public key needs to be copied to ~/.ssh/authorized_keys ( cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys) on your windows XP box.
Now linux is very fussy about the permissions on this authorized_keys file - although not sure if windows will be.
On Linux the .ssh directory must be 700 and the authorized_key file 600.
Let me know how you get on.
Paul
Many thanks Paul, I've got it working now (though I feel like a plonker!). Cheers for the help, you saved me a lot of time
_pigro_ said:
Many thanks Paul, I've got it working now (though I feel like a plonker!). Cheers for the help, you saved me a lot of time
Click to expand...
Click to collapse
If it makes you feel any better, getting the private/public keys mixed up is a really common problem! It's not just you
I have set up such keys in the past successfully from the same XP box to my old Nokia N900 (even managed to set up reverse tunnel so that I could login to phone from PC wherever it happened to be whilst on 3G) so I *should* know what I'm doing ... just a "senior moment" today hopefully!
Big thumbs up for the juicessh app by the way. Clean & simple interface, very nice.
Just released an update to the Play Store that includes a nice new widget for our Pro customers running Android 3.0+ (Honeycomb) that allows quick homescreen access to your frequently used connections, or specific groups:
Quick bug report: I was abouit to report this with the previous version until I saw the post saying there was an update. I've updated but the bug is still there.
I have my WiFi -> Advanced -> keep WiFi on during Sleep set to "Always".
I disable WiFi (and go automatically to mobile data) and then run Juicessh to connect to a remote server.
I then exit the session (by typing "exit" into the terminal) and before doing anything else I check the above setting and it has changed from "Always" to "Never". Not a big deal, but it was driving me a bit crazy until I tracked down what it was that was making my phone use mobile data every time the screen was off!
Samsung Galaxy Note, stock build on ICS 4.0.4.
_pigro_ said:
Quick bug report: I was abouit to report this with the previous version until I saw the post saying there was an update. I've updated but the bug is still there.
I have my WiFi -> Advanced -> keep WiFi on during Sleep set to "Always".
I disable WiFi (and go automatically to mobile data) and then run Juicessh to connect to a remote server.
I then exit the session (by typing "exit" into the terminal) and before doing anything else I check the above setting and it has changed from "Always" to "Never". Not a big deal, but it was driving me a bit crazy until I tracked down what it was that was making my phone use mobile data every time the screen was off!
Samsung Galaxy Note, stock build on ICS 4.0.4.
Click to expand...
Click to collapse
Interesting, thanks for pointing this out. I will do some testing and try to get this resolved for our next update - which should be hitting very soon and including a much requested feature... PIN lock for the app.
JuiceSSH said:
Interesting, thanks for pointing this out. I will do some testing and try to get this resolved for our next update - which should be hitting very soon and including a much requested feature... PIN lock for the app.
Click to expand...
Click to collapse
I think I've found the issue here - would you be able to help test if I send you over an update with the fix included?
yes, no problems. do you want me to PM you an email address?
_pigro_ said:
yes, no problems. do you want me to PM you an email address?
Click to expand...
Click to collapse
Have just PM'd you the build - let me know if it helps and i'll merge this into our next update.
Thanks!
Hi, I just tested the new .apk you provided but it's still doing the same as before.
Also FYI - it is not neccessary to go onto a mobile data connection to trigger the problem, that was just the way I happened to be using the app when I noticed the bug.
So, if I am on my home WiFi (with Keep wifi on during sleep set to "always") I can run juicessh, connect to a server on my own LAN and then after, exiting the ssh session, the WiFi setting has immediately changed from "Always" to "Never".
Let me know if you need any further info, and if you'd like me to do any more testing.
Hi Guys,
I've been trying to find the keys juiceSSH generated when I first installed it in order to put in the authorized_Keys on my server, but for the life of me I can't find them.
Anyone know where they are?
Thank you in advance,
J
JohnerH said:
Hi Guys,
I've been trying to find the keys juiceSSH generated when I first installed it in order to put in the authorized_Keys on my server, but for the life of me I can't find them.
Anyone know where they are?
Thank you in advance,
J
Click to expand...
Click to collapse
Hi,
JuiceSSH does not (currently) generate any SSH keys for you - it can only import ones created elsewhere with ssh-keygen or other such tools.
You might be thinking of the encryption password that you're prompted for when you first ran the app? This is used to generate an AES-256 key that encrypts all of your settings, connections, passwords etc so that they are not stored in plain text.
Thanks.
Paul

[UPDATE] All Android Wifi Tools In One Place

I have done some reading and observed some Android Wifi tools which could be useful to you guys.
I know some of you guys already know about some of these apps whiles others don't.
My First Wifi Tool is Dsploit.
Introducing dSploit
dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc . This application is still in beta stage, a stable release will be available as soon as possible, but expect some crash or strange behaviour until then, in any case, feel free to submit an issue on GitHub.
Here are some screen shots http://www.dsploit.net/images/shots/1.png
http://www.dsploit.net/images/shots/2.png
And A Walk through Video http://youtu.be/HrQl1cG2Hq0
And you could visit their website http://www.dsploit.net/
My srecond Wifi tool I wanna Show you Guys is Anti-Android Network Toolkit
What is Anti?
ZImperium LTD is proud to annonce Android Network Toolkit - Anti.
Anti consists of 2 parts: The Anti version itself and extendable plugins. Upcoming updates will add functionality, plugins or vulnerabilities/exploits to Anti
Using Anti is very intuitive - on each run, Anti will map your network, scan for active devices and vulnerabilities, and will display the information accordingly: Green led signals an 'Active device', Yellow led signals "Available ports", and Red led signals "Vulnerability found". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how to fix each one of them.
This App is Kind of a paid App. But you can get the free version from here http://zantiapp.com/anti.html
Here is a link to the walk through video http://youtu.be/tKW-XV59-gk
My third Wifi Tool is Wifi Kill
Its an application for killing wifi connections, that is preventing users on that network from getting to their websites.
I couldnt find the website for this app. (Seems they dont have any). But you could download it from
Here : http://mediafire.com/?ue5itmf89w5h4x2
Here is a link to the walk through video http://www.youtube.com/watch?v=MtaPF6NcOeo
My third Wifi Tool is Droid Sheep.
Its Actually in Two forms
DroidSheep [Root] is an Android app for Security analysis in wireless networks and capturing facebook, twitter, linkedin and other accounts.
DroidSheep Guard is another Android app for monitoring Androids ARP-table. It tries to detect ARP-Spoofing on the network, such as an attack by DroidSheep, FaceNiff and other software.
For Some reasons, the Doidsheep[Root] cant be downloaded from their website which is this http://droidsheep.de/
But dont worry you can find it here at http://depositfiles.com/files/ektsufdkl
On the other hand, DroidSheep Guard can be found at the playstore
https://play.google.com/store/apps/...h.droidsheep.guard.free&feature=search_result
The next one is Android Netspoof
Description
Network Spoofer lets you change websites on other people’s computers from an Android phone. After downloading simply log onto a Wifi network, choose a spoof to use and press start.
Please note that there is no intention for Network Spoofer to include any malicious features. This application is a fun demonstration of how vulnerable home networks are to simple attacks, with permission of the network owner - DO NOT attempt to use Network Spoofer on any corporate or other non-residential networks (eg. at school, university). It becomes very obvious when Network Spoofer is being used on a Network, and use of Network Spoofer will be considered malicious hacking by network administrators.
It can be downloaded from here http://sourceforge.net/projects/netspoof/files/latest/download
There is another App called AoutoProxy
Description
The most complete proxier on the Market. Autoproxy allows you to use Market, Gmail, maps or surf the web even behind the proxy from your home/school/office.
It works by creating a transparent/intercepting proxier running on your phone that redirects web traffic to your proxy. Other apps don't have to be aware there is a proxy!
All outgoing traffic is captured, formatted and transmitted through your network's proxy. That means it works with market, all browsers, gmail, maps, and others.
This is App is a paid app but they have got the light version.
here is a link to it https://play.google.com/store/apps/details?id=com.mgranja.autoproxy&hl=en
FaceNiff
FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.
It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK)
It's kind of like Firesheep for android. Maybe a bit easier to use (and it works on WPA2!).
*** ROOTED PHONE *** is required. Please note that if webuser uses SSL this application won't work.
This application due to its nature is very phone-dependant so please let me know if it won't work for You
Use with stock browser (might not work with other)
Legal notice: this application is for educational purposes only. Do not try to use it if it's not legal in your country.
I do not take any responsibility for anything you do using this application. Use at your own risk
It can be downloaded from here http://faceniff.ponury.net/download.php
I will Be updating the list frequently.
UPDATE
So as i said, i would be updating this and guess what i have kept my promise.
There is this App called Intercepter-NG its another android wifi tool i find useful.
Intercepter-NG is a multifunctional network toolkit for various types of IT specialists. It has functionality of
several famous separate tools and more over offers a good and unique alternative of Wireshark for android.
The main features are:
* network discovery with OS detection
* network traffic analysis
* passwords recovery
* files recovery
Runs on Android >=2.3.3 with root+busybox
Looks better on high resolution, but completely comfortable on 480x720.
It can be downloaded from the playstore https://play.google.com/store/apps/...t#?t=W251bGwsMSwxLDEsInN1LnNuaWZmLmNlcHRlciJd
Another important Wifi tool for android is Wifi WOlf
- PCMag.com Editors' Choice award winner for network utilities
If you are a network administrator or a network engineer that has any WiFi / wireless on your network then you already know that you need a good WiFi network monitoring / analyzer tool or toolkit to properly manage and analyze inside your wireless network. Without the proper network tools you have no way to determine proper functionality of your WiFi network or identify security risk that comes with having wireless technology inside of your enterprise corporate LAN. As a network administrator or engineer you already have many other responsibilities with your network such as managing servers, routers, switches, workstations, inventory management, asset management, bandwidth monitoring, troubleshooting... the list is long. Make sure you have a tool that makes your wireless network management easier!
- Active Passive Pre-Deployment and Site Survey and WiFi Analyzer network tools for wireless professionals. Works on 802.11 N, G, B, and A networks (Depends on device)
Quickly perform wifi site surveys by simply double tapping on floor plan to register samples
2.4Ghz and 5Ghz wifi analyzer fully supported in all wireless tools
WiFi Heatmapper
WiFi AP Edge Map
WiFi Channel Map
WiFi Stumbler
WiFi Analyzer
Access point filters allow you to analyze AP edge individually
Wireless security filters identify and analyze secure and non-secure (WEP, Ad-Hoc, Open) wireless networks
Sub-filters allow you to filter out weak WiFi coverage areas
Network Icons for mapping out your hardware
Export all views for email or printing
Export and Import all surveys for backup or to share with other techs using Wolf WiFi Pro
Create multiple sites
Supports and analyze broadcast and hidden SSIDs (once known to device)
Complete help documentation at www.wolfwifi.com and videos on www.youtube.com
-WiFi Scanner and analyzer with summary view and detailed view
-Channel Graph displays and analyze channels in use to easily identify congestion
-Signal Tracker helps you track down access points and adjust antennas
-802.11 A/B/G/N support (depends on device)
It can also be downloaded from the store https://play.google.com/store/apps/...nByaXNpbmdhcHBzLmFuZHJvaWQud29sZndpZmlwcm8iXQ..
And one more thing, The app WifiKIll can also be used to redirect web pages to a specific site.
you can do so by first knowing the sites IP Address, then u open the wifi kill app and go to settings the select rejection method drop policy + redirect to.......
Afterwards click on redirect to IP and insert the Ip of the site you want to redirect to.
Note that None of these Apps are mine and all these apps require root, also i am not the cause of any damages these apps could do to your phone. Thanks
Enjoy:fingers-crossed:
But If you have any questions with these apps or questions on how to install any of them, feel free to ask.
Thanks once more.
DroidSheep link is broken
Turbokat said:
DroidSheep link is broken
Click to expand...
Click to collapse
Its not broken, just choose regular download and wait for the countdown to complete.
Sent from my myTouch 4g using xda app-developers app
here you guys might like this as well.
https://app.box.com/s/1h0mdqynmb5lcz0gasbf
Another tool for site survey
There is another free android tool for heat maps creation - "WiFi Maps Light", available on GOOGLE PLAY, documentation can be found on app's official site.
you gonna want for sure bcmon.apk if you want to get your wifi crack on. crack wep and wpa/wpa2-wps natively in rooted android rom.
http://bcmon.blogspot.com/
https://bcmon.googlecode.com/files/bcmon.apk
https://code.google.com/p/bcmon/
thisworks on a lot of devices i have it working on a samsung galaxy nexus sprint, htc glacier, samsung galaxy s2, nexus 7-2012-grouper, and a couple others. no need for custom rom even just root and youre golden
Commented to follow on this wonderful index
Sent from my E151
Network Toolbox for Android
Another great tool I came across recently is Network Toolbox for Android:
play .google .com/store/apps/details?id=com.appsropos.whois
It includes a bunch of handy admin tools including Whois, RBL checks, DNS and ARIN lookups, Ping, Port Scan, find external IP, Geo Location for Ip addresses, CIDR calculator, Email server tester, and much more! :good:
mark.worth.666 said:
Another great tool I came across recently is Network Toolbox for Android:
play.google .com/store/apps/details?id=com.appsropos.whois
It includes a bunch of handy admin tools including Whois, RBL checks, DNS and ARIN lookups, Ping, Port Scan, find external IP, Geo Location for Ip addresses, CIDR calculator, Email server tester, and much more! :good:
Click to expand...
Click to collapse
asdfghjkl
ktetreault14 said:
asdfghjkl
Click to expand...
Click to collapse
Trying to push it up?
Sent from my HTC Desire HD using XDA Free mobile app
mickeyasamoah said:
Trying to push it up?
Sent from my HTC Desire HD using XDA Free mobile app
Click to expand...
Click to collapse
yes lmao. i haven't found a reliable app for all the wifi tinkering and what not
A bit of help maybe please on Zimperium's anti
I had dsploit installed and stupidly uninstalled it because now I cannot find the last version apk anywhere.
Anyway, I installed Z's ANTI. Everything seemed to go OK. My android is rooted and superuser rights were granted to the app.
My problem is that when it runs a network scan it recognizes my router but no open ports and that seems to be the end of it.
Any advice?
silvanet said:
I had dsploit installed and stupidly uninstalled it because now I cannot find the last version apk anywhere.
Anyway, I installed Z's ANTI. Everything seemed to go OK. My android is rooted and superuser rights were granted to the app.
My problem is that when it runs a network scan it recognizes my router but no open ports and that seems to be the end of it.
Any advice?
Click to expand...
Click to collapse
Me too. I found zanti (dsploit) difficult to use. I would wish to have guides for learning purpose.
Sent from my XT1033 using XDA Free mobile app
I've tried various man in the middle hacks on my laptop with the new zAnti. Its actually very cool
Don't download droid sheep from here (virus)!! I looked at the md5 hash and it did not match the ones of the last 3 versions (the md5 hashes are on http://droidsheep.de/?page_id=23) and also android warned me and blocked the installation
Download the one on https://forum.xdadevelopers.com/showthread.php?t=1539105 from the comment of user "Dlll" i verified the md5 and it matched the version 14 on http://droidsheep.de/?page_id=23 (verify it yourself if you don't trust me)
Stay safe
How to verify?
Graciasz
Muchos gracias ?

[APP][Android 4.4+][iOS 9.0+] XVacuum Firmware (Xiaomi Vacuum - Roborock v1/v2/v3)

XVacuum Firmware
Flashing firmwares and sound packages from your smartphone (Android and iOS)
Roborock v1/v2(S50/51/55), T6, S6, 1S, T7, Q7 are supported.​
The first and second generations have common language packs. The third (T6, S6, 1S) has its own packs.
Android:
(only pkg is supported, neither 7z, nor zip, nor rar but only pkg in the unarchived view; as for sound packages, be aware that wav-files in an archive isn't a pkg-package). These packages should be opened only from the internal storage (/sdcard). It will better if you place packages into root folder. Also avoid any special characters in file names, as the robot isn't able to download such files.
iOS:
Firmwares and sound packages must be placed in Documents folder of the application by iTunes (Shared Files section), iTools, iFunbox or other similar applications. (only pkg is supported, neither 7z, nor zip, nor rar but only pkg in the unarchived view; as for sound packages, be aware that wav-files in an archive isn't a pkg-package). Also avoid any special characters in file names, as the robot isn't able to download such files.
At the moment, there are two ways (see below):
Without Wi-Fi reset of the robot (you need to get the token by any available ways).
With Wi-Fi reset (the application will get the token by itself)
The instruction without Wi-Fi reset (you need to get the token by any available ways):
Launch the application.
Click the menu and then Settings.
Fill the IP and token of the robot.
Click the "Save" button.
The application will ask you to restart the application for applying the settings, kill the application:
Android: double click to "Back" button or click "Exit" from the menu.
iOS: double click to "Home" button and swipe up the application to kill it.
Launch my program again. The program is written for "blondies": there is almost no way to make mistakes. It consists of two buttons (firmware and sound), and that's all. An "About" menu is also available should you want to know more about me and contribute to the project.
The buttons will be inactive until the program has established connection with the robot and received a status.
As soon as the status have arrived, the buttons become active and you can start flashing the robot.
Choose a firmware or sound package.
Notice the log under the buttons and rejoice at the quick and easy flashing.
If you got an error:
"timeout: Could not connect to the vacuum, handshake is timeout", it means that you filled the invalid IP of the robot.
"timeout: Call to the vacuum timed out" after 50 tries to get the status, it means that you filled the invalid token.
"timeout: Call to the vacuum timed out" after 50 tries of flashing a firmware, it means that your cleaner doesn't support local updates (it was blocked 4004 and higher for the first generation, 1910 and higher for the second generation, the third generation was blocked always). The first and second generation can be reseted to the factory firmware if it is below 4004 for the first generation, below 1910 for the second generation. https://support.roborock.com/hc/en-us/articles/360035372632-How-to-reset-Roborock-to-factory-default
The instruction with Wi-Fi reset (the application will get the token by itself):
You need to reset the Wi-Fi settings of the robot to use this program (you will need to add the robot to MiHome again after all processing is complete).
For the first version: press the "Home" and "Power" buttons simultaneously within 3 seconds.
For the second version: press the "Spot Clean" and "Home" buttons within 3 seconds.
Your robot should say that Wi-Fi is reset and a new access point should appear in your smartphone. Connect to it.
Disable your mobile internet because some phones ignore Wi-Fi unless it provides an internet connection.
Launch my program. The program is written for "blondies": there is almost no way to make mistakes. It consists of two buttons (firmware and sound), and that's all. An "About" menu is also available should you want to know more about me and contribute to the project.
The buttons will be inactive until the program has established connection with the robot and received a token and status.
As soon as the token and status have arrived, the buttons become active and you can start flashing the robot.
Choose a firmware or sound package.
Notice the log under the buttons and rejoice at the quick and easy flashing.
After all processing is complete, you will need to add the robot to the MiHome.
Attention!
Due to the built-in file manager, Play Protect considers the application potentially dangerous and doesn't allow most users to install it. To install the application anyway:
1. Open "Play Market".
2. Tap on "Play Protect" in the menu.
3. Disable the "Check security risks" option during the installation of the application.
Android:
Download the application: View attachment XVacuum Firmware 4.1.0 - Andoid 4.4+.zip (unpack it before using)
Developer: .//Hack
Minimal version of Android: 4.4
iOS:
Download the application: View attachment XVacuum Firmware 4.1.0 - iOS 9.0-15.2.zip (unpack it before using)
Developer: .//Hack
Minimal version of iOS: 9.0
If you don't have JailBreak use Cydia Impactor.
If you have wav-files and want to make a pkg file, just use my program wav2pkg (Windows) - below.
Do you want to thank the developer financially?
Details
Tinkoff card: 5536 9137 9197 1969
Sberbank card: 2202 2007 1004 4098
Kykyryza card: 2 9603257 90117
Ozon card: 2 2302318 050546
PayPal: [email protected] (EUR, USD, RUR)
Yandex.Money (YooMoney): 41001365201505
WebMoney:
- WME: E266145873860
- WMZ: Z130755667036
- WMR: R830172982278
History
04.01.2022 (4.1.0)
The application works better with the third generation (1S, T6, S6, T7, S5 Max and etc.)
Updated the bank accounts.
iOS8 is out of date now to support the maximum version range (9.0-15.2).
Small fixes.
18.01.2020 (4.0.0)
The application tries to reconnect in any way possible in a case when the connection is lost.
If regional lock is activated the application tries to disable it few times. On failure, it displays an error to the log.
Fixed working after waking up from sleeping on iOS. Previously, you need to restart the application.
Requests to a vacuum work faster now.
Many small fixes
21.09.2019 (3.3.0)
The path to the selected file is displayed in the log
08.09.2019 (3.2.0)
The information about the vacuum is got in the background mode
Small fixes
25.08.2019 (3.1.2)
Added information about a vacuum to the log (Model, Firmware and IP)
Disabling the regional lock to have able to flash a firmware without the regional lock
Small fixes
24.07.2019 (3.0.1)
Small bug fixes
Added information about support for Roborock v3 (T6, S6, 1S)
09.06.2019 (3.0.0)
You can flash the robot without Wi-Fi reset (the IP and token must be filled in the setting from the menu, after saving, the setting you need to restart the application).
Logs are extended. It will show more information in case of unexpected errors.
Now, the bank details can be copied by the click on the neded line.
In case of success flashing, a window with information about me will be shown.
31.03.2019 (2.2.0)
Fixed the log block collapse.
Small fixes: mainly for iOS.
25.03.2019 (2.1.1)
Small fixes and iOS version.
14.01.2019 (2.1.0)
The code is significantly refactored and compressed.
14.01.2019 (2.0.0)
Now the application has a built-in file manager. You can select only pkg (many people tried to flash everything except pkg, not understanding what they did wrong). The "Back" button closes the file manager but does not move up one level. I'll add it in next versions.
Added new bank details to the "About" window.
13.01.2019 (1.0.2)
Now the socket closes together with the application. You won't get the error EADDRINUSE (Address already in use) when you restart the application.
12.01.2019 (1.0.1)
The window "About" can be closed with the "Back" button.
The menu can be closed with the "Back" button.
The application is now compressed at less than 1MB.
Added the current version to the "About" window.
Minimal version of Android is 4.4 (most likely the log block will be collapsed on Android 4-5, so you can see one line only).
9.01.2019 (1.0.0)
The first released version.
Known issues
java.net.BindException: bind failed: EADDRINUSE (Address already in use): or similar errors with "Address already in use" can occur if other programs use the 8080 and 8081 ports. If you cannot identify such a program, just close all programs and restart XVacuum Firmware.
If your phone has gone to the sleep, most likely the phone will stop accepting connections. The robot will return an error, since it won't be able to download the firmware;
The "Back" button closes the file manager but does not move up one level.
[Android]A file can be chosen from the internal storage (/sdcard) only
wav2pkg​The program converts wav-files to pkg-package and backward (Windows)​
Unpack the program to the root of any disk (advanced users: the path must not contain any spaces or non-Latin symbols). For example: C:\wav2pkg
The instruction to make pkg-package:
Place all folders with wav-files to the "voicepacks" folder. The folders must contain only Latin symbols, digits and/or underscores. You can place any number of folders. The program converts them into separate pkg files. The path must be, for example, C:\wav2pkg\voicepacks\english\*.wav
Launch wav2pkg.bat from the wav2pkg folder
The program will start displaying information about the progress of the conversion.
Produced packages will be placed into the "voicepacks" folder and carry the names of the folders that they were converted from.
You don't need to remove pkg-files before the next launch of the program.
The instruction to extract wav-files from pkg-package:
Place all pkg-files to the "pkgs" folder. The packages must contain only Latin symbols, digits and/or underscores. You can place any number of packages. The program extracts them into separate folders. The path must be, for example, C:\wav2pkg\pkgs\english.pkg
Launch wav2pkg.bat from the wav2pkg folder
The program will start displaying information about the progress of the conversion.
Produced wav-files will be placed into folders which carry the names of the packages that they were extracted from and they will be placed into the "pkgs" folder.
You don't need to remove folders before the next launch of the program.
Download: View attachment wav2pkg.zip
Russian community of flashing of this vacuum robot
Does no one need this? Or maybe did I place the thread in the wrong forum's section? Because the thread in the russian community is very hot. The application was downloaded more than 4000 500 000 times.
Could you please explain for what I need this? I have this s50 robot, but I don't know the exact purpose of this topic. I have eu version and english voices. There is some modifications or funny voices?
.//Hack said:
Does no one need this? Or maybe did I place the thread in the wrong forum's section? Because the thread in the russian community is very hot. The application was downloaded more than 4000 times.
Click to expand...
Click to collapse
Thank you now have ssh access. Looking for some language packs now : )
Work perfectly on Gen1 !
I flashed this french sound pack
(thank Pierre in comment: link)
Thanks buddy!!! Finally found a thread in English that covers firmware flashing.
I have the Gen 2 (s50) international version and want to flash to China version in order to connect to China server.
Where do I find the latest China version firmware for s50?
Sent from my iPhone using Tapatalk
Does anyone have all the instruction lines for sound pack? I am making a pkg for dutch. I have the instruction lines for error 1-19. But I still need to have english instructions for some commands. I hope someone can help me. Otherwise how can i extraxt a pkg, so I can see what wav files are inside the pkg?
Thank you.
Dutch voice pack/Nederlandse stem
I made a dutch voice pack/Nederlandse stem voor Mi Robot Vacuum/Roborock.
https://drive.google.com/open?id=1Ttd8F0Xa2n5jrpgOMdJEkc6VzB2axFMC
I used the list with the sound instructions from here: https://4pda.ru/forum/index.php?showtopic=881982&st=3980#entry83141327
Thank you for this great apk to transfer the pkg to the vacuum cleaner.
I updated the application. I have added support of iOS
S6 FW
Any lockout for flashing s6 FW to T6 machine? Plz
mikaelivalbo said:
Any lockout for flashing s6 FW to T6 machine? Plz
Click to expand...
Click to collapse
Sorry, 1S, t6 / s6 have different encryption keys. At the moment, nobody knows them.
Thanks for the app, but I'm waiting for it to be compatible with vacuum 1s. I try this but can't send voices (the token captures ok).
I read in last post I read that isn't posible
When somebody get access to the filesystem of the vacuum and find the encryption keys We'll can make voice and firmware packs for the vacuum. Now we can flash original packs only.
.//Hack said:
When somebody get access to the filesystem of the vacuum and find the encryption keys We'll can make voice and firmware packs for the vacuum. Now we can flash original packs only.
Click to expand...
Click to collapse
Thank you! we will wait.
@.//Hack
Please link to XVacuum Firmware 3.0.0.apk
Ubimo said:
@.//Hack
Please link to XVacuum Firmware 3.0.0.apk
Click to expand...
Click to collapse
Sure, I'm going to update. Maybe today or tomorrow.
Ubimo said:
@.//Hack
Please link to XVacuum Firmware 3.0.0.apk
Click to expand...
Click to collapse
Done!
The application is updated (3.0.1)
Enjoy!

Categories

Resources