Intercepter-NG (ROOT)

Intercepter-NG (ROOT)


Intercepter-NG is a multifunctional network toolkit for various types of IT specialists. It has functionality of
several famous separate tools and more over offers a good and unique alternative of Wireshark for android.
The main features are:
* network discovery with OS detection
* network traffic analysis
* passwords recovery
* files recovery

WARNING! If you face any problems reinstall busybox and supersu!

Runs on Android >=2.3.3 with root+busybox
Looks better on high resolution, but completely comfortable on 480x720.

Recent changes:
Warning! Make sure you have the latest versions of SuperSU (not superuser) and Busybox!

1.5 - nothing new, only api level updated for kitkat.
Add to list
Free
80
4.0
User ratings
4563
Installs
100,000+
Concerns
0
File size
0 kb
Screenshots
Screenshot of Intercepter-NG (ROOT) Screenshot of Intercepter-NG (ROOT) Screenshot of Intercepter-NG (ROOT)
About Intercepter-NG (ROOT)
Intercepter-NG is a multifunctional network toolkit for various types of IT specialists. It has functionality of
several famous separate tools and more over offers a good and unique alternative of Wireshark for android.
The main features are:
* network discovery with OS detection
* network traffic analysis
* passwords recovery
* files recovery

WARNING! If you face any problems reinstall busybox and supersu!

Runs on Android >=2.3.3 with root+busybox
Looks better on high resolution, but completely comfortable on 480x720.

Recent changes:
Warning! Make sure you have the latest versions of SuperSU (not superuser) and Busybox!

1.5 - nothing new, only api level updated for kitkat.

Android Market Comments
A Google User
6 days ago
Virus !!
A Google User
Jun 25, 2015
AWESOME ! Better than dsploit, Csploit, zANTI etc.
A Google User
Jun 24, 2015
It's ok First you have to root your divice to make it work
A Google User
Jun 16, 2015
:)
A Google User
Jun 15, 2015
OK... ... just installed and looks promising, once I learn how to use it. But right now, my main concern is to detect who is actually performing this kind of MITM s**t on my own network. Is this helpful on that matter...?
Version 1000000
Version 1000000