Droidsheep
Droidsheep’s main task is session hijacking. It steals cookies to get access to the person’s personal account without knowing his/her password. To make it more clearly, when any other person using the same WiFi that your android device is connected, opens any sites like Facebook and log in there then that person’s browser sends cookies. The main work of Droidsheep is to steal or hijack that cookies. Then using that cookies you can get access or open his account and do whatever you want. Just remember, it doesn’t provide you any login information like username or password.
Requirements: Android device must be rooted and must have an ARM CPU.
Droidsheep for Android
dSploit
dSploit mostly offers MITM (Man In The Middle) attacks, which includes: sites redirection, connection killing, season hijacking, script injection, videos or images replacement and more.
It’s a comprehensive set of tools which can be used by anyone in order to perform a number of advanced network related tasks. For example you can cause havoc with friends or family by replacing all images that appear on every http website on a computer with an image you specify. You can also completely block all internet traffic on any device using the same WiFi. There are a number of other tools such as password sniffers and login crackers, which of course should never be used for anything malicious.
Requirements: Android device must be rooted and must have an ARM CPU.
dSploit for Android
zANTI
zANTI basicaly does the same as dSploit. It comes in a modern design with easy to use menu. This mobile penetration testing toolkit lets security managers assess the risk level of a network with the push of a button. zANTI enables IT Security Administrators to simulate an advanced attacker that helps to identify the malicious techniques they use to compromise any WiFi network. It’s a powerful tool that brings MITM (Man In The Middle) attacks and more extra features in one place.
Requirements: Android device must be rooted.
zANTI for Android