Sniffing Tools

Sniffing includes catching, translating, inspecting and interpreting the data inside a network packet on a TCP/IP arrange. In this Kali Linux Tutorial, we show you how to use Ettercap. Here we can find a list of Sniffing Tools.

Top 7 Best Sniffing Tools

Android PCAP 

With Android PCAP you can capture data without running a custom firmware and be gaining root access. Any devices that have RTL 8187 chipset should work. Resulting Pcap File can be viewed with Wireshark or Cloudshark


It is a command line packet capture utility that used to capture packets with Wifi and Mobile data. To use this tool you should have the device rooted because Tcpdump needs to be run at a superuser level

Also Read 25th Birthday Wishes – Text Messaging(SMS)

Shark for Root

Traffic sniffer works on 3G and WiFi (works on FroYo tethered mode too). To open dump use WireShark or similar software, for preview dump on phone use Shark Reader. But there were no newer releases and it seems that original developer dropped the project.


dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assessments on a mobile device.

tPacketCapture – Sniffing tools

tPacketCapture does packet capturing without using any root permissions. tPacketCapture uses VpnService provided by Android OS. Captured data are saved as a PCAP file format in the external storage. Detailed analysis can be done through Wireshark


zANTI is a mobile penetration testing toolkit that helps in quickly discovering the unsafe elements in your networks. The tool scans for network security, Vulnerabilities scan and Man in the Middle attack.


It used to play a prank with friends by disabling internet connections to them, it has features like grabbing traffic, showing websites visited by the grabbed device and it is supported android version above 4.x only.


These are the best tools at the time of writing, if you find any new best tools, please don’t forgot to add in the comment section.