zANTI is an award-winning Mobile Penetration Testing software specially built for smartphones and the first of its kind for mobile devices.
The revolutionary softSware is the winner of the renowned PCMag Editor’s Choice Award and the THN Tool of the Year award. zANTI has been hailed by popular technology media such as Engadget and Forbes and won acclaim from the worldwide security community.
Some would recognize the very scary Zanti in “The Zanti Misfits,” from the 1963 television show, “The Outer Limits.” Watch it on Youtube in the end of the page.
Our own zANTI — as you can imagine — is designed not to scare, but to secure our mobile world and make it safer for you. The release version of the beta, which was codenamed ANTI, or Android Network Toolkit, has come after almost a year of testing by about 100,000 users.
We first created ANTI to demonstrate that smartphones are the equal of computers in the way penetration testers/IT managers can use for their daily tasks. Soon enough, ANTI became one of the most used smartphone apps among pentesters and security enthusiasts that wanted a simple tool to provide them real-time status of their network security.
We chose a new name for the release version, from the tens of different variations. With the naming protocol of our other products — zCore IPS, zDefender and zAppliance — it only made sense to call it
zANTI boosts the normative IT security toolbox and enables you to run a complete vulnerabilities scan on your network with the click of a button. You can also get a visual status of the devices connected to the same physical network.
Here is a longer list of zANTI’s powerful features:
• Common vulnerabilities search
• Cloud-based report to fix recognized vulnerabilities including wise analysis for critical flaws
• Password audit to check for password complexity
• Audit password complexity in a specific device or entire LAN
• Detect misconfiguration of device firewall by detecting open ports
• Check network vulnerability to MITM and common client side and server side vulnerabilities
• Discover insecure traffic and cookies affecting network’s privacy settings.
• Alert network vulnerability to MITM attacks by demonstrating live modification of unsecured communication’s images
• Visualise network by watching live photo feeds, recorded from unsecured network
• WiFi monitor to benchmark nearby networks