Best Android apps for:
Vulnerability scanner


Are you looking for the best vulnerability scanner Android apps? With so many to choose from, it can be difficult to decide which one is right for you. This guide is designed to help you find the best vulnerability scanner Android apps for your needs. We've compiled a list of the top-rated vulnerability scanner apps available for Android devices so that you can easily compare and select the one that is right for you. From free and open-source options to paid, feature-rich solutions, we've got you covered. Read on to find out which vulnerability scanner is the best fit for you.

connectivity - Protecting networks - Threats and vulnerability - Access control and identity management - Educating and protecting user - Operating systems and application security - Cryptography basics - Cryptography...

Avira Vulnerability Checker will test your device for the “OneClassToRuleThemAll” CVE-2015-3825 – Android Serialization Vulnerability.

We can really help you * We are a team of ex government security professionals with over 50 years combined experience in the spy world. * We have seen how easy it is to spy on anyone at anytime and we have decided to stop this. People deserve...

show that malicious apps can leverage an Android vulnerability to hide themselves from discovery and removal more details:...

FireWall and IDS/IPS. 3) Vulnerabilities - Vulnerability Scanning, Vulnerability Research, Web Penetration Testing, Network Penetration Testing, Server Penetration Testing and More Coming Soon, 4) Security...

The Check Point QuadRooter Scanner analyzes your Android smartphone or tablet to discover if it’s vulnerable to the newly-discovered QuadRooter vulnerabilities. QuadRooter allows attackers to take complete control of Android...

** * News: Thousands of Android apps fail to validate SSL certificates *** US CERT has recently identified about 3,400 Android apps to date that do not properly validate SSL certificates, leaving them open to Man in the Middle (MITM) attacks. ...

Scanner - by Zimperium Recently a new vulnerability was discovered called “Shellshock,” that targets BASH, a popular software widely used to control the command prompt on many *nix computers....

(from browser links). A recently discovered vulnerability uses Samsung MMI codes and can wipe your device. Apart from that this exploit can be used on malicious web pages to block your SIM card. Since the data wipe is...

Network Mapper is unofficial Android frontend for well known Nmap scanner. Frontend will help you to download and install Nmap as well as use it. Nmap will help you to discover hosts, protocols, open ports, services and its...

Network IP Scanner allow you to scan IP allocation and opened port in local area network. What is the use for scan IP allocation and port ? ● Are there suspicious vulnerabilities or security issues within the network. ● ...

Nipper is very useful for checking the security of the type CMS (Content Management System) websites, especially if they are the most used platforms like WordPress, Drupal, Joomla, Blogger, Magento, Concrete5, VBulletin. Scan Nipper Web Toolkit will...

and enterprise data on them. - Qualcomm Tether Controller Vulnerability (CVE-2016-2060), on a phone using unpatched Qualcomm CPUs , 3rd party apps could gain cell phone radio manager access in the background without your...

this app scanning?On Jun 16, a critical security vulnerability has been published (CVE-2015-2865), which impacts multiple Galaxy modules including the newly released S6. This vulnerability allows an attacker to...

This Application is updated version of Web SQl-i available on Google Play Store. Web SQL-i 2.0 is much fast and better than previous version. Using this application user will be able to find sql injection vulnerable websites easily without using...

ReKey is a mobile application that fixes the recently-disclosed "Master Key" vulnerabilities discovered by Bluebox and other parties that affect nearly all Android devices in the wild and allow attackers to take full control of a...

The Android Installer Hijacking vulnerability can be used by attackers to potentially distribute malware, compromise devices, and steal user data. This free applications from Palo Alto Networks detects if your device is vulnerable...

& open Source app to scan for Shellshock vulnerability in Android. Full description here : http://blog.indiandragon.in/2014/10/shellshock-vulnerability-in-android.html Source code :...

Wordpress Security Scanner Includes: - Version fingerprinting. - Checking path disclosure. - Checking directory listing. - User enumerating. - Checking core vulnerabilities. - Checking plugins vulnerabilities. - Checking themes...