DroidSniff was developed as a tool for testing the security of your accounts.
This software is neither made for using it in public networks, nor for hijacking any other persons account.
It should only demonstrate the poor security properties network connections without encryption have.
So do not get DroidSniff to harm anybody or use it in order to gain unauthorized access to any account you do not own! Use this software only for analyzing your own security!
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you
Features of Droidsniff
[Added] Support for Reddit
[Added] Check Update with Updater
[Improvement] Actionbar for android below
4.0 with new sexy UI
[Improvement] The session list will not
jump back to the top when the list
refreshed/new session added.
[Improvement] Green tick on the icon will
be showed when you saved a cookie
[Improvement] Arp Spoof Service – Cleaned
up some code and added “killall arpspoof”
[Removed] Pop Up Activity
[Fix] Sniffed Google and Amazon URL
Requirements of Droidsniff
Android 4.1.2 (Atleast)
Access to SuperUser (Rooted Phone)
How to use Droidsniff?
Droidsniff can easily spoof the address of a existing device in the network and it is able to receive all the communications of the the actual device in the network.
Step 1: Download and install apk from the github link above and install it.
Step 2: Before connecting to the wifi add the links you want to spoof and the IP address of the Spoof.
Step 3: Now connect to the wifi network and start spoofing the IP address in the netowork.
Step 4: Now if you want to open the website click in the link that your are spoofing.
Step 5: Open the website an you would have found yourself in the actual device’s user account in your device hence the data was spoofed.