The New zANTI: Mobile Penetration & Security Analysis Toolkit

Share and earn Cybytes
Facebook Twitter LinkedIn Email

zANTI is an easy to use penetration testing and a security analysis toolkit.

With zANTI you can simulate real-world, commonly-used malicious cyberattack techniques.
Using zANTI, you will quickly discover unsafe elements in your networks, and in your devices that are connected to those networks.
Using zANTI, you will understand unsafe conditions on your devices in three layers: OS, applications and actual device usage.
For more information, and to download zANTI 3.0 for free, please go to:

zAnti is an android application that will run with a rooted permission on a Android phone with “permissive” SElinux.

At the highest level, zANTI lets testers know:

  • Who is, or was, connected to their network.
  • What isn’t safe on the network of connected devices.
  • What isn’t safe in network settings.
  • What isn’t safe within applications.
  • What isn’t safe in your device usage.
  • Where extra cyber protection is needed.

The latest version, zANTI 3.0, includes the real-world, commonly-used cyberattack technique capabilities that enable penetration testers to perform multiple operations, as outlined in the bullets and screenshots below.


Scan Your Network

Conduct network scans, in different levels, to identify connected devices and their details:

Get Detailed Information

  • Device name, model and manufacturer
  • Device OS and OS version
  • Device open ports, network IP and MAC address
  • Endpoint User-Agents

Check for Weak Points

Identify vulnerabilities by:

  • Scanning without the device being exploited


  • Matching known OS details

Simulate Attack Patterns

Conduct Man In the Middle (MITM) attacks in order:

  • Identify device properties that won’t be identified by scanning
  • Monitor decrypted data sent by the web browsers and the device application

Test With In-depth Attack Methods

Test/perform other MITM actions, e.g.,

  • Session Hijacking
  • User and password Phishing attempts
  • Browsing redirection
  • SSL stripping
  • Image replacement

Reveal Exploits

Enter the router management console in one click, if the username and password is not strong enough.

1-Click Reports

Producing scanning reports and enable to store and share them for each scanned network.

zANTI, because in order to be safe, you need to know where you are vulnerable…


The post The New zANTI: Mobile Penetration & Security Analysis Toolkit appeared first on Zimperium Mobile Security Blog.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Zimperium
Zimperium, the industry leader in Mobile Threat Defense, offers real-time, on-device protection against both known and previously unknown threats, enabling detection and remediation of attacks on all three mobile threat vectors - Device, Network and Applications. Zimperium’s patented z9™ detection engine uses machine learning to power zIPS™, mobile on-device Intrusion Prevention System app, and zIAP™, an embedded, In-App Protection SDK that delivers self-protecting iOS and Android apps. Leaders across the mobile ecosystem partner with Zimperium, including mobile operators (Airtel, Deutsche Telekom, SmarTone, SoftBank and Telstra), device manufacturers (Samsung, SIRIN, TriGem), and leading enterprise mobility management (EMM) providers (AirWatch, MobileIron, BlackBerry, Citrix and SAP). Headquartered in San Francisco, Zimperium is backed by Sierra Ventures, Samsung, Telstra, Warburg Pincus and SoftBank. Learn more at or our official blog at
Promoted Content
Mobile Threat and Vulnerability Report
Download Zimperium's Enterprise Mobile Threat Report for information mobile malware and Wi-Fi attacks around the globe plus how to defend against, KRACK, BankBot, and other mobile device vulnerabilities.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?