Top 15 GSMmap Alternative and Similar Softwares | Dec 2024

The GSM Security Map at gsmmap.org compares the protection capabilities of mobile networks. This app collects data and adds it to GSM Map.
This application currently only works on Android 4.1.2 Samsung S2 and S3 devices and requires root priviliges during the mobile network data capture.

Note: Custom Android systems like Cyanogenmod are not supported!

1. cSploit

cSploit The most complete and advanced IT security professional toolkit on Android.- enumerate local hostsdone- find vulnerabilitiesdone- find exploits for these vulnerabilitiesdone- use those exploits to gain access to the targetdone- crack wifi passwords- install backdoors for later access- Portability: It can run on any UNIX-based system, but for now only......

2. Android IMSI-Catcher Detector

Android IMSI-Catcher Detector AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike.......

3. Wireshark

Wireshark Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark has a rich feature set which includes the following: -Deep inspection......

4. NetworkMiner

NetworkMiner NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to......

5. Luks manager

Luks manager LUKS Manager provides on-the-fly encryption (AES by default) to virtual folders on Android devices.These virtual folders can be dynamically mounted, unmounted, created and deleted as needed. Similar to Truecrypt in functionality.Note: Truecrypt and LUKS Manager volumes are not cross-compatible.......

6. Shell Control Box

Shell Control Box Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers - integrating seamlessly into existing networks.......

7. Aerohive ID Manager

Aerohive ID Manager ID Manager Cloud-Enabled Self-Service Access ManagementAerohive's ID Manager is the first enterprise access management system to leverage the cloud to simplify and automate the deployment and onboarding of guest and employee personal devices to the enterprise network.ID ManagerAerohive simplifies onboarding by combining industry-leading authentication integration with the Aerohive Cloud Services......

8. edgescan

edgescan edgescan is a cloud-based continuous vulnerability management and penetration testing solution. It is a highly accurate SaaS (Security-as-a-Service) solution which helps clients to discover, and manage application and network vulnerabilities (full-stack information security) on an ongoing basis. All vulnerabilities are verified by our security analysts which results in accurate, "false-positive......

9. Linksys Smart Wi-Fi

Linksys Smart Wi-Fi Home networking just got a lot more fun and easily accessible. With Linksys Smart Wi-Fi you can get access into your home network from anywhere at any time. Plus, continue to get new apps and capabilities that will optimize your connected experiences. From your Linksys Smart Wi-Fi mobile app easily......

10. Damballa

Damballa Automated Breach DefenseYour network security controls are in place to prevent, detect and respond to threats. When prevention fails, and it will, the time it takes to detect and respond to a threat makes the difference between dodging a bullet and suffering catastrophic business loss.Damballa Failsafe is an automated breach......

11. Agiliance

Agiliance Agiliance, the Big Data Risk Company, is the leading independent provider of integrated solutions for Operational and Security Risk programs. Agiliance RiskVision is automating how Global 2000 companies and government agencies achieve continuous monitoring of big data across financial, operations, and IT domains to orchestrate incident, threat, and vulnerability actions......

12. Geo IP Tool

Geo IP Tool Find a geolocation of an IP address including latitude, longitude, city, region and country.......

13. SharkSSL

SharkSSL The SSL/TLS and Certificate tutorial for Windows enables you to fast track your understanding of the SSL/TLS protocol, Certificate Management, and secure communication. The download includes many C source code examples, including a secure WebSocket tutorial. You can either compile the examples "as is" or modify them to suite your......

14. DroidWall

DroidWall DroidWall - Android Firewall is a front-end application for the powerful iptables Linux firewall. It allows you to restrict which applications are permitted to access your data networks (2G/3G and/or Wi-Fi).This is the perfect solution if you don't have an unlimited data plan, or just wants to see your battery......

15. Luminet

Luminet Designed from the ground up for enterprise fraud management, Luminet helps you monitor, detect, and prevent a range of privacy violations. It protects your organization against insider fraud, false payments, account takeovers, policy manipulation, identify theft, IT sabotage, and regulatory violations.......