Commit b5514cb2 authored by Re4son's avatar Re4son

Initial commit

Signed-off-by: Re4son's avatarRe4son <[email protected]>
parents
/config.py
/unsigned/
/repo/
/archive/
/logs/
/tmp/
/builder/
*~
*.swp
*.swo
*.pyc
.fdroid*
*.apk
*.jks
/metadata/dump_*
/stats/logs/
/stats/data/
/build/*/
!/build/extlib/
/build/.fdroidvcs-*
/stats/publishsigkeys.jar
# used in fdroidserver's ./jenkins-test
keystore.jks
AuthorName: '[email protected]'
Categories:
- RF
CurrentVersionCode: 4
CurrentVersion: '0.2.1'
IssueTracker: ''
Name: Walrus
SourceCode: 'https://github.com/TeamWalrus/Walrus'
License: 'GPL-3.0'
WebSite: 'https://walrus.app/'
Use your existing contactless card cloning devices with your Android device
Add Mifare 1k support for Proxmark
Add manual card entry support for HID cards
Add detailed view for HID card data
Allow manual editing of HID card data
Decoding of HID card data
Better device support for Proxmark including RDV4
Walrus enables you to use your existing contactless card cloning devices with your Android device. Using a simple interface, cards can be read into a wallet to be written or emulated later.
Designed for physical security assessors, Walrus has features that will help you in your next red team engagement. Bulk card reading lets you easily capture multiple cards as you move around your target location, while simultaneous device reading lets you use different devices to read multiple card types all at once.
Walrus currently supports the Proxmark3 and the Chameleon Mini, with more device support on the way.
NOTE: Walrus requires the use of one of the supported devices; it cannot read or write cards directly through your Android device.
Use your existing contactless card cloning devices with your Android device
AuthorName: 'Christos Kyriakopoulos'
Categories:
- WiFi
CurrentVersionCode: 32
CurrentVersion: "1.5-beta.8"
IssueTracker: 'https://github.com/chrisk44/Hijacker/issues'
Name: Hijacker
SourceCode: 'https://github.com/chrisk44/Hijacker'
WebSite: 'https://github.com/chrisk44/Hijacker'
RequiresRoot: 'Yes'
All-in-one WiFi cracking tools
Add optional client count label next to AP tile icons
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses.
This application requires an ARM android device with an internal wireless adapter that supports Monitor Mode. A few android devices do, but none of them natively. This means that you will need a custom firmware. Any device that uses the BCM4339 chipset (MSM8974, such as Nexus 5, Xperia Z1/Z2, LG G2, LG G Flex, Samsung Galaxy Note 3) will work with Nexmon (which also supports some other chipsets). Devices that use BCM4330 can use bcmon.
An alternative would be to use an external adapter that supports monitor mode in Android with an OTG cable.
The required tools are included for armv7l and aarch64 devices as of version 1.1. The Nexmon driver and management utility for BCM4339 and BCM4358 are also included.
Root access is also necessary, as these tools need root to work.
All-in-one WiFi cracking tools
AuthorName: '[email protected]'
Categories:
- Forensics
CurrentVersionCode: 24
CurrentVersion: '4.3'
IssueTracker: 'https://github.com/HobbyOneDroid/HashDroid/issues'
Name: Hash Droid
License: 'GPL-3.0'
SourceCode: 'https://github.com/HobbyOneDroid/HashDroid'
WebSite: 'https://github.com/HobbyOneDroid/HashDroid'
RequiresRoot: 'No'
Hash Droid is a free utility to calculate a hash from a given text or from a file stored on the device.
In this application, the available hash functions are : Adler-32, CRC-32, Haval-128, MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-256, SHA-384, SHA-512, Tiger and Whirlpool.
The calculated hash can be copied to the clipboard to be reused elsewhere.
The first tab enables to calculate the hash of a given string.
The second tab helps you to compute the hash of a file located on the internal or external memory of your device. The size of the file and the last date modified are also displayed.
The last feature helps you to compare the calculated hash with another given hash but more generally, you can compare any hashes by just pasting them.
A hash (also called checksum or digest) is a digital fingerprint, uniquely identifying a string or a file.
Hash functions are often used in cryptography to generate strong passwords. They are also employed to check the integrity of files.
Hash Droid is often used to check an Android ROM before flashing it.
Feel free to send feebacks, comments or suggestions about this application.
Hash Droid is published under the GPLv3 (GNU General Public License version 3). The source code is available here: https://github.com/HobbyOneDroid/HashDroid
AuthorName: 'Dennis Mantz'
Categories:
- RF
CurrentVersionCode: 1303
CurrentVersion: "1.13"
IssueTracker: 'https://github.com/demantz/RFAnalyzer/issues'
Name: RF Analyzer
SourceCode: 'https://github.com/demantz/RFAnalyzer'
WebSite: 'http://tech.mantz-it.com/'
RF spectrum visualizer for HackRF/RTL-SDR
* Bookmark frequencies
* Including hackrf_android 1.12 (support for rad1o)
* Select unit for frequency and bandwidth (MHz,kHz,Hz) in jump dialog
* Support for Marshmallow permission model
* Many bugfixes
Use an OTG (on-the-go) USB cable to connect your HackRF/RTL-SDR to an Android phone/tablet and this app will visualize the RF spectrum (frequency magnitude and waterfall plot)!
Browse through the frequency spectrum just by using scroll and zoom touch gestures. Additional features as of today are:
- Many settings: FFT size, averaging, peak holding, color scheme, ...
- read samples from a file (generated by hackrf_transfer tool or by rtl_sdr)
- AM/FM/SSB audio demodulation
- adjust squelch and channel width
- Record to a raw IQ file compatible with hackrf_transfer, ...
- Bookmarks
- rad1o support
Read the manual for more details: https://github.com/demantz/RFAnalyzer/blob/master/doc/rf_analyzer_manual.md
Due to time constraints the app is currently not actively developed anymore.
I also try to keep the app stable and as bug-free as possible. Bug reports are always welcome and I try to find the time to fix them! Note that there is a logging feature in the settings which helps a lot with trouble shooting any errors.
Interested in the latest updates? Join the beta program: https://play.google.com/apps/testing/com.mantz_it.rfanalyzer
PERMISSIONS:
This app uses the INTERNET permission only to connect to the local rtl_tcp instance used by the RTL2832U driver. The WRITE_EXTERNAL STORAGE permission is only used to write log files to the SD card (disabled by default).
WHAT YOU NEED:
In order to use this app you will need:
- A HackRF or an RTL-SDR dongle (this is obvious xD)
- An Android device that either supports USB OTG (please google if your device supports OTG!) or has an USB host port
- An USB OTG cable (costs about 3$) to connect the HackRF/RTL-SDR to your Android device (not needed if your device has a full size USB host port)
- Only for RTL-SDR: The free RTL2832U driver from Martin Marinov (https://play.google.com/store/apps/details?id=marto.rtl_tcp_andro)
IMPORTANT:
The HackRF/RTL-SDR is powered by the Android phone/tablet. Some phones or tablets might not deliver enough power on their USB port to power the HackRF/RTL-SDR (power issues are often caused by low quality USB cables or OTG adapters). Also notice that doing the necessary digital signal processing is very CPU intensive and though I did my best to optimize the algorithms the app still needs a decent device (I recommend 2 CPU cores or more) to run fluently. Please use the 2-hour refund period provided for every Google Play app to test functionality and refund the app if it does not work for your device!
Here is a list of already tested and working devices (may be incomplete):
- Nexus 7 2012
- Nexus 7 2013
- Nexus 5
- Moto G
- Moto G 4G
- Acer A500
- Samsung S3 LTE
- Samsung S4
- Samsung S4 LTE
- Samsung S5
- Samsung Note 3
- Samsung Galaxy Tap S 8.4 & 10.5
- HTC M7
- HTC M8
- LG G2
- LG G3
- Motorola Xoom M601
- Dragon Touch A1X
If the app is working for you and your device is not in this list, please include your phone type in a short rating
and share the good news with other users ;)
Here is a list of devices that were reported NOT to work with this app (may be incomplete):
- Sony Xperia Pro + HackRF (because USB output power is too low -.-)
- Nexus 4 (works only with Y cable and custom ROM to enable OTG support)
- Nexus 9 (Not a power issue, I am still investigating on this)
LICENSE:
This application is released under the GNU General Public License v2. It is free software and the source code is
available on GitHub: https://github.com/demantz/RFAnalyzer
The APK package is also available in the git repository and you can download and install it from there. But keep in mind: by downloading the app from the store you will get automatic updates!
LEGAL ISSUES
Please note that I am not responsible for any legal issues caused by the usage of this application. Be responsible and comply with your local law!
RF spectrum visualizer for HackRF/RTL-SDR
AuthorName: 'Kali Linux'
Categories:
- NetHunter
CurrentVersionCode: 2019030022
CurrentVersion: '2019.3-rc22'
IssueTracker: 'https://gitlab.com/kalilinux/nethunter/store/nethunter-store-client/issues'
Name: NetHunter Store
License: 'GPL-2.0-or-later'
SourceCode: 'https://gitlab.com/kalilinux/nethunter/store/nethunter-store-client'
WebSite: 'https://www.nethunter.com'
RequiresRoot: 'No'
* Added categories: Development, Spoofing & Sniffing, System
NetHunter Store is an installable catalogue of free security applications for the Android platform.
The client makes it easy to browse, install, and keep track of updates on your device.
Android itself is open in the sense that you are free to install apks from anywhere you wish, but there are many good reasons for using the NetHunter Store as your free software app manager:
* Dedicated to the needs of security professionals
* Be notified when updates are available
* optionally download and install updates automatically
* Keep track of older and beta versions
* Filter apps that aren't compatible with the device
* Find apps via categories and searchable descriptions
* Access associated urls for donations, source code etc.
* Stay safe by checking repo index signatures and apk hashes
AuthorName: 'Kali Linux'
Categories:
- NetHunter
CurrentVersionCode: 2019020100
CurrentVersion: '2019.2'
IssueTracker: 'https://gitlab.com/kalilinux/nethunter/apps/kali-nethunter-app/issues'
Name: NetHunter
License: 'GPL-2.0-or-later'
SourceCode: 'https://gitlab.com/kalilinux/nethunter/apps/kali-nethunter-app'
WebSite: 'https://www.nethunter.com'
RequiresRoot: 'Yes'
NetHunter installer, updater, and interface for Kali Linux on Android
* Disable "update" function as we now have the store
The Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform. The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. NetHunter is an open-source project developed by Offensive Security and the community.
# Kali NetHunter Application
* Home Screen - General information panel, network interfaces and HID device status.
* Kali Chroot Manager - For managing chroot metapackage installations.
* Check App Update - For checking Kali NetHunter Android App updates.
* Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
* Custom Commands - Add your own custom commands and functions to the launcher.
* MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
* VNC Manager - Set up an instant VNC session with your Kali chroot.
* HID Attacks - Various HID attacks, Teensy style.
* DuckHunter HID - Rubber Ducky style HID attacks
* BadUSB MITM Attack - Nuff said.
* MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
* MITM Framework - Inject binary backdoors into downloaded executables on the fly.
* NMap Scan - Quick Nmap scanner interface.
* Metasploit Payload Generator - Generating Metasploit payloads on the fly.
* Searchsploit - Easy searching for exploits in the Exploit-DB.
Requires root, nethunter chroot and nethunter kernel
NetHunter installer, updater, and interface for Kali Linux on Android
AuthorName: 'Kali Linux'
Categories:
- NetHunter
- Utilities
- System
CurrentVersionCode: 2019020100
CurrentVersion: '2019.2'
IssueTracker: 'https://gitlab.com/kalilinux/nethunter/apps/kali-nethunter-terminal/issues'
License: 'GPL-2.0-or-later'
Name: NetHunter Terminal
SourceCode: 'https://gitlab.com/kalilinux/nethunter/apps/kali-nethunter-terminal'
WebSite: 'https://www.nethunter.com'
Kali Linux command line shell
This is a new fork of the Android Terminal Emulator customized to our neeeds for Kali NetHunter.
This diff is collapsed.
This diff is collapsed.
This diff is collapsed.