Android Creative Tools


Android SDK -   A software development kit that enables developers to create applications for the Android platform. If you’re a new Android developer, we recommend you download the ADT Bundle to quickly start developing apps. The Android SDK includes sample projects with source code.     Download here

Burp Suite -  Burp Suite is an integrated platform for performing security testing of web applications.Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun. Download here

Androguard -Create your own static analysis tool,; Analysis a bunch of android apps,; Analysis .Open source database of android malware. Download here

ApkInspector -   The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps. Download here

DroidBox -  Its developed to offer dynamic analysis of Android applications. The following information is shown in the results, generated when analysis is ended:
•    Hashes for the analyzed package
•    Incoming/outgoing network data
•    File read and write operations
•    Started services and loaded classes through DexClassLoader
•    Information leaks via the network, file and SMS
•    Circumvented permissions
•    Cryptography operations performed using Android API
•    Listing broadcast receivers
•    Sent SMS and phone calls
Additionally, two images are generated visualizing the behavior of the package. One showing the temporal order of the operations and the other one being a treemap that can be used to check similarity between analyzed packages. Download here

Android Framework for Exploitation - Smartphone Pentest Framework: Rather this tool allows you to assess the security of the smartphones in your environment in the manner you’ve come to expect with modern penetration testing tools.  Download here

Android Network Toolkit (ANTI) - This app is capable of mapping your network, scanning for vulnerable devices or configuration issues. It is for use by the amateur security enthusiast home user to the professional penetration tester, ANTI provides many other useful features such as:
easy connection to open ports, visual sniffing (URLs & Cookies) and – establishing
MiTM attacks (using predefined and user-defined filters), Server Side / Client Side Exploits, Password cracker to determine password’s safety level, Replace Image as
visual in demos and Denial of Service attacks. All this is packed into a very user-friendly and intuitive Android app (and soon to be released iOS app). Download here

Am I Hacker Proof -  Am I Hacker Proof scans your network, computer or website from the outside as a hacker would, looking for vulnerabilities. Once it finds the vulnerabilities, it will email or text you
 letting you know how many vulnerabilities you have. In addition, in the paid version you can check to see if your voicemail on your cell phone is hacker proof.
This App does not use any resources on your phone. Once you start a scan you will be
notified via email or text your scan started. When your scan is completed you will be notified again that your scan is complete.
Am I Hacker Proof includes these services for free:
– Choose from three types of scans: A “Quick” scan (up to four hours), a “Complete” scan
 (can take up to four days to complete), and a Web site scan (searches for vulnerabilities in certain types of Web sites; currently supports WordPress Web sites).
- You can perform a scan on any Web or IP address.
- You can scan up to 10 times a month.
- Built- in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real
 time cyber security news feeds.
– Your reports are saved in a PDF file that you can read on your device or forward to any email address you like.
- Your account on your device works on the website www.AmIHackerProof.com so you can have access to more applications.
-> Voicemail Hacking.
- Built-in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real time cyber security news feeds.
- Search through the scans you performed by address, time, number of vulnerabilities, or status.
- You get an email and text message letting you know the number of vulnerabilities found on that IP address or website.  Download here

Free Avast Antivirus For Android Security -  By using Avast Mobile Security in your Android phone, your cell phone will be       protected  by virus, threat, hacker, even it’s able to minimize your loss if your Android cell phone is stolen. The antivirus component supports real-time protection and automatic updates. Updates can be configured to only be downloaded over certain types  of connections and the interface can be protected with a password.Protect personal data with automatic virus scans and infected-URL alerts. Stop hackers by adding a firewall (rooted phones). Control anti-theft features with remote SMS commands for: history wipe, phone lock, siren activation, GPS tracking, audio monitoring, and many other useful tools.

 Call and SMS filtering can help device owners block annoying advertising calls or spam   text messages. Users can define groups of phone numbers and configure the blocking intervals for them.The firewall component is only available for rooted devices because it requires special system-level access to enforce its rules. Device owners can use it to block individual applications from accessing the Internet over certain types of connections.   Download here


Have you ever forgotten the password of your home WiFi network, or the one you setup for your parents a few months back?
This application will help you recover the password of a wireless network you have connected to with your device in the past. You can then either tap on an entry to copy it, or export the list to SD, or share it using the standard Android sharing facilities.
It does not crack the network, or use the MAC/SSID address to deduce the password. It    simply reads it from the device itself.