Features of MqttDroid:
• Robust MQTT client based on HiveMQ
• Supports these control types: toggle, toggle with slider, range, trigger and gauge
• One MQTT topic per control action, with separable pub / sub, QoS and retain support
• Customizable title, subtitle and group per control
• Customizable look and feel of each control tile (a range of stock Android flavors are offered. Alternatively, a custom icon and color can be chosen)
• Customizable toggle on / off payloads
• Customizable min, max, and step values for slider actions. Display as values or percentage
• Unlock to use can be set per control (only available on Android 13+)
• Live updates while on the device controls screen
• In-app log to check for recent MQTT activity
• A single broker with support for basic authentication
• Backup and restore all controls via a retained MQTT message on the broker
• Material You
• Robust MQTT client based on HiveMQ
• Supports these control types: toggle, toggle with slider, range, trigger and gauge
• One MQTT topic per control action, with separable pub / sub, QoS and retain support
• Customizable title, subtitle and group per control
• Customizable look and feel of each control tile (a range of stock Android flavors are offered. Alternatively, a custom icon and color can be chosen)
• Customizable toggle on / off payloads
• Customizable min, max, and step values for slider actions. Display as values or percentage
• Unlock to use can be set per control (only available on Android 13+)
• Live updates while on the device controls screen
• In-app log to check for recent MQTT activity
• A single broker with support for basic authentication
• Backup and restore all controls via a retained MQTT message on the broker
• Material You
features of the ANY.RUN:
1. Interactive Analysis: ANY.RUN provides a hands-on approach to malware analysis, allowing users to directly interact with and influence the behavior of suspicious files and URLs in a controlled environment.
2. Live Monitoring: The platform offers real-time observation of system activities, including process creation, file operations, and network connections, enabling immediate insights without waiting for post-analysis reports.
3. Community-Driven Intelligence: A global network of security researchers contributes to a collective database, enriching the platform with up-to-date threat intelligence and analysis reports.
4. YARA Search Capability: Users can perform rapid YARA searches across a vast repository of threat data, with the ability to download and further examine matched samples.
5. Threat Intelligence Feeds: ANY.RUN streams the latest indicators of compromise (IOCs) in real-time, helping users to stay ahead of emerging threats by integrating this data into their security systems.
6. MITRE ATT&CK™ Mapping: The service aligns its detection signatures with the MITRE ATT&CK framework, offering structured insights into attack techniques and aiding in the education of cybersecurity personnel.
7. Interactive Process Graphs: Malicious activities are visualized in an interactive graph, providing a clear overview of the attack chain and simplifying the analysis process.
8. Multi-Browser Support: The sandbox supports the latest versions of popular browsers, enhancing the analysis of phishing attacks and other browser-specific exploits.
9. Comprehensive File Analysis: ANY.RUN maintains a comprehensive database of analyzed files, which users can access for reanalysis or export for external examination.
1. Interactive Analysis: ANY.RUN provides a hands-on approach to malware analysis, allowing users to directly interact with and influence the behavior of suspicious files and URLs in a controlled environment.
2. Live Monitoring: The platform offers real-time observation of system activities, including process creation, file operations, and network connections, enabling immediate insights without waiting for post-analysis reports.
3. Community-Driven Intelligence: A global network of security researchers contributes to a collective database, enriching the platform with up-to-date threat intelligence and analysis reports.
4. YARA Search Capability: Users can perform rapid YARA searches across a vast repository of threat data, with the ability to download and further examine matched samples.
5. Threat Intelligence Feeds: ANY.RUN streams the latest indicators of compromise (IOCs) in real-time, helping users to stay ahead of emerging threats by integrating this data into their security systems.
6. MITRE ATT&CK™ Mapping: The service aligns its detection signatures with the MITRE ATT&CK framework, offering structured insights into attack techniques and aiding in the education of cybersecurity personnel.
7. Interactive Process Graphs: Malicious activities are visualized in an interactive graph, providing a clear overview of the attack chain and simplifying the analysis process.
8. Multi-Browser Support: The sandbox supports the latest versions of popular browsers, enhancing the analysis of phishing attacks and other browser-specific exploits.
9. Comprehensive File Analysis: ANY.RUN maintains a comprehensive database of analyzed files, which users can access for reanalysis or export for external examination.