2014-02-01 00:40:00 +00:00
|
|
|
Categories:Security
|
2014-01-27 21:47:11 +00:00
|
|
|
License:GPLv2+
|
2014-08-26 11:30:35 +00:00
|
|
|
Web Site:
|
2014-01-26 22:26:14 +00:00
|
|
|
Source Code:https://github.com/x942/secdroid
|
|
|
|
Issue Tracker:https://github.com/x942/secdroid/issues
|
2015-06-03 16:10:02 +00:00
|
|
|
Changelog:https://github.com/x942/secdroid/wiki/Change-Log
|
2014-01-26 22:26:14 +00:00
|
|
|
|
2014-03-16 05:03:21 +00:00
|
|
|
Auto Name:SecDroid
|
2014-01-26 22:56:18 +00:00
|
|
|
Summary:Secure your device from attacks
|
2014-01-26 22:26:14 +00:00
|
|
|
Description:
|
|
|
|
SecDroid hardens the android kernel by disable certain binaries that have
|
2015-09-12 05:52:14 +00:00
|
|
|
internet access or can be used as an attack vector and by securing the TCP Stack
|
|
|
|
using Systctl. This helps prevent some MITM (Man-In-The-Middle) and Spoofing
|
|
|
|
attacks. It may also prevent some DOS (Denial-Of-Service) Attacks.
|
2014-01-26 22:26:14 +00:00
|
|
|
|
|
|
|
Disabled services include SSH, SSHD, Telnet NC (net cat), and Ping, to keep
|
|
|
|
others from gaining access to your device via a remote terminal. SecDroid also
|
|
|
|
disables Package Manager so that no apps can be installed remotely to your
|
|
|
|
device (you can still install them from Market or using APK files directly on
|
2015-09-12 05:52:14 +00:00
|
|
|
the device itself). Lastly, it also allows you to disable ADBD (the ADB service
|
|
|
|
running on the device that allows you to connect to it through command line from
|
|
|
|
a remote computer) until the next reboot.
|
2014-01-26 22:26:14 +00:00
|
|
|
.
|
|
|
|
|
2015-09-09 20:23:17 +00:00
|
|
|
Requires Root:yes
|
2014-01-26 22:29:25 +00:00
|
|
|
|
2014-01-26 22:26:14 +00:00
|
|
|
Repo Type:git
|
|
|
|
Repo:https://github.com/x942/secdroid.git
|
|
|
|
|
|
|
|
Build:3,4
|
|
|
|
commit=6eb44e63d
|
|
|
|
|
|
|
|
Auto Update Mode:None
|
|
|
|
Update Check Mode:RepoManifest
|
|
|
|
Current Version:3
|
|
|
|
Current Version Code:4
|
|
|
|
|