PeterUpfold / dump-iphone-backupLinks
Dump an encrypted iPhone backup to a folder for analysis of any artifacts, organised by domain and path of the source file.
☆20Updated 2 years ago
Alternatives and similar repositories for dump-iphone-backup
Users that are interested in dump-iphone-backup are comparing it to the libraries listed below
Sorting:
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆20Updated 4 years ago
- Autopsy module that creates an encrypted or unencrypted iOS backup of iPhone or iPad and extracts files from them.☆71Updated last year
- A library that injects into SpringBoard and bruteforce the 4-digit lockscreen pin.☆10Updated 10 years ago
- Crack ios Restriction PassCode in Python☆38Updated 5 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆23Updated 5 years ago
- The most available software’s for the tracking purpose of any cell phone user. Spy mobile tracker is compatible with any smart phone like…☆12Updated 10 years ago
- Use this script to search through locally stored files for any Credit/Debit card details.☆30Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Updated last year
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆25Updated 4 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Updated 5 years ago
- Tool to Disable User Lock☆25Updated 3 years ago
- ☆11Updated last week
- It Map Social Media With Photo☆29Updated 3 years ago
- Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with inten…☆24Updated 4 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆24Updated 4 years ago
- A swiss army knife for pentesting networks☆23Updated 2 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Updated 8 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆28Updated 9 months ago
- CameraDar hacks its way into RTSP CCTV cameras.☆11Updated 8 years ago
- Keylogger for ethical hackers☆13Updated 4 years ago
- The most reliable source of background screening records. A frequent automated update process ensures the reliability & availability of u…☆11Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Updated 4 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- FACEBOOK CLONING NEW TOOL NUMBER CLONING , MAIL CLONING , AND FRIENDLIST CLONING ALL IN ONE TOOL …☆12Updated 4 years ago
- BlueHunter is bluetooth device hacking framework☆24Updated 2 years ago
- Automated Password Cracking Tool☆17Updated 5 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆24Updated 4 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆14Updated last month