SecDroid [ROOT]

SecDroid [ROOT]


**Please consider buying the donate version too!***

SecDroid hardens the android kernel by disable certain binaries that have internet access or can be used as an attack vector and by securing the TCP Stack using Systctl. This helps prevent some MITM (Man-In-The-Middle) and Spoofing attacks. It may also prevent some DOS (Denial-Of-Service) Attacks.

NOTE: ROOT IS NEEDED!


Binary's that are disabled:

* irsii
* nano
* nc (net cat)
* netserver
* netperf
* opcontrol
* scp
* rsync
* sdptest
* ssh
* sshd
* strace
* tcpdump
* vim
* Telnet
* ping (Changed so only root can use)

* pm (package manager) is disabled so install apps via adb is disabled
* adbd (adb daemon) is disable as well to prevent an attacker from using tools such as p2p-adb by Kos

This is a work in progress so please let me know what you want added, removed, changed, or fixed.

Recent changes:
Version 0.1 (Alpha) - First release may have bugs.
Version 0.2 (Alpha) - Fixed path issues. Now using /system/bin instead of /system/xbin (which was wrong).
Version 0.3 (Alpha) - Fixed Bugs and now checks both /system/bin and /system/xbin for binaries to make sure it doesn't miss any. Added Buttons to XDA thread and Website.
Version 0.4 (Beta) - Fixed bugs where ADBD isn't disabled on some devices. Added Enable ADBD button.
Version 0.5 (Beta) - Added Super User Permission.
Add to list
Free
88
4.4
User ratings
89
Installs
5,000+
Concerns
0
File size
161 kb
Screenshots
Screenshot of SecDroid [ROOT] Screenshot of SecDroid [ROOT] Screenshot of SecDroid [ROOT]

About SecDroid [ROOT]
**Please consider buying the donate version too!***

SecDroid hardens the android kernel by disable certain binaries that have internet access or can be used as an attack vector and by securing the TCP Stack using Systctl. This helps prevent some MITM (Man-In-The-Middle) and Spoofing attacks. It may also prevent some DOS (Denial-Of-Service) Attacks.

NOTE: ROOT IS NEEDED!


Binary's that are disabled:

* irsii
* nano
* nc (net cat)
* netserver
* netperf
* opcontrol
* scp
* rsync
* sdptest
* ssh
* sshd
* strace
* tcpdump
* vim
* Telnet
* ping (Changed so only root can use)

* pm (package manager) is disabled so install apps via adb is disabled
* adbd (adb daemon) is disable as well to prevent an attacker from using tools such as p2p-adb by Kos

This is a work in progress so please let me know what you want added, removed, changed, or fixed.

Recent changes:
Version 0.1 (Alpha) - First release may have bugs.
Version 0.2 (Alpha) - Fixed path issues. Now using /system/bin instead of /system/xbin (which was wrong).
Version 0.3 (Alpha) - Fixed Bugs and now checks both /system/bin and /system/xbin for binaries to make sure it doesn't miss any. Added Buttons to XDA thread and Website.
Version 0.4 (Beta) - Fixed bugs where ADBD isn't disabled on some devices. Added Enable ADBD button.
Version 0.5 (Beta) - Added Super User Permission.

Visit Website
User reviews of SecDroid [ROOT]
Write the first review for this app!
Android Market Comments
A Google User
May 11, 2014
Simple One-Click OS Hardening Works a charm. Locks down several possible security vulnerabilities. To second another poster, would be great if you could add an option to run at boot automatically! Thanks for your work and for giving the public this free tool! BTW, I got a newer version on XDA Developers I believe. DEVS: Any way you could add a disable Bluetooth feature? Thanks for all your hard work!!
A Google User
May 11, 2014
I think it broke some dependencies i can no longer freeze apps due to locked state.
A Google User
Mar 12, 2014
Thanks
A Google User
Dec 31, 2013
Good... Breaks Busybox for me, too. I paid for donation to support this one of a kind developer for this one of a kind app. I do feel safer using it and reinstalling Busybox isn't particularly difficult. I just need to find the motivation to take the dev up on his offer to troubleshoot the issue. Automatic startup options would be nice=)
A Google User
Dec 10, 2013
Seemed to work, but broke Dsploit. After running that securing/hardening function, Dsploit is having problems finding the kill all binary, and the busybox installer now fails to uninstall. Otherwise good app. Edit: Any way to reverse the changes done by Secdroid?