Top 15 PDroid Alternative and Similar Softwares | May 2024

PDroid allows blocking access for any installed application to the following data separately:
-Device ID (IMEI/MEID/ESN)
-Subscriber ID (IMSI)
-SIM serial (ICCID)
-Phone and mailbox number
-Incoming call number
-Outgoing call number
-GPS location
-Network location
-List of accounts (including your google e-mail address)
-Account auth tokens
-Contacts
-Call logs
-Calendar
-SMS
-MMS
-Browser bookmarks and history
-System logs
-SIM info (operator, country)
-Network info (operator, country)
For device ID, phone and mailbox number, SIM serial, subscriber ID and device location it also allows supplying custom or random values.
...

1. Grabber Web Application Scanner

Grabber Web Application Scanner Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website.Grabber is simple, not fast, but portable and really adaptable. This software is designed to scan small websites such as personal sites, forums etc. It is a very small application: it would take too much......

2. Bluesniff

Bluesniff Bluesniff is a proof of concept Bluetooth device discovery tool. Bluesniff can be concidered a bluetooth wardriver of sorts. It is meant to raise awareness of BT security issues and likely has a lot of room for improvement.Bluesniff can look for BT devices in one of two modes:Normal Scan -......

3. Unified VRM by NopSec

Unified VRM by NopSec NopSec Unified VRM® provides up to a 40% time savings for security teams by eliminating the manual tasks involved with vulnerability risk management. Our cloud-base solution helps you identify, prioritize, proactively manage and report on IT vulnerabilities and security breaches from a single platform.Our Differentiators:1. Adaptive Expert Intelligence - Offers......

4. LiveDump

LiveDump LiveDump is a simple memory dumper which will either dump a region of memory once to a file or constantly dump it every X many milliseconds.......

5. Kon-Boot

Kon-Boot Kon-Boot is an prototype piece of software which allows to change contents of a linux kernel (and now Windows kernel also!!!) on the fly (while booting). In the current compilation state it allows to log into a linux system as 'root' user without typing the correct password or to elevate......

6. Armitage

Armitage Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit......

7. EssayTyper

EssayTyper EssayTyper types your essay in minutes! Just enter a topic, click the pencil icon and start typing, the app automatically pulls content and adds it as you type.......

8. btscanner

btscanner btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the RSSI and link quality. btscanner is based on the BlueZ Bluetooth......

9. Social-Engineer Toolkit

Social-Engineer Toolkit The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration......

10. recALL

recALL recALL is free and portable multifunctional password recovery and auditing solution for Windows - instantly finds and recovers passwords from more than 200 popular applications (FTP, E-mail clients, Instant Messengers, Browsers) and recovering licenses from over 2800 programs.......

11. Core Impact Pro

Core Impact Pro Core Impact Pro is the most comprehensive software solution assessing and testing security vulnerabilities throughout your organization. Core Impact Pro tests across a broad spectrum of risk areas including: - endpoint systems - passwords & identities- mobile devices- wireless networks- web applications & web services- network systems......

12. Hacksy

Hacksy Hacksy is a security service where interaction occurs through a chatbot that can advise on things like password strength and social engineering concerns and also keep you updated on whether your personal details have been leaked on the net.......

13. GEEKtyper

GEEKtyper "Hack" like a programmer in movies and games! GeekTyper was inspired by the various media where hacking is usually portrayed incorrectly. Simply randomly mash your keyboard and code will display on your screen. Press TAB to display hotkeys that activate various effects......

14. BeEF

BeEF BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.......

15. SkidBase

SkidBase Are you looking for a leakedsource alternative? Here is a Lookup tool that includes all the big databases such as myspace, twitter, 000webhost, ashley madison and Linkedin. This will help you protect your instagram, xbox, twitter and other social media accounts from being hacked. Sign up today and see if......