PeterUpfold / dump-iphone-backupLinks
Dump an encrypted iPhone backup to a folder for analysis of any artifacts, organised by domain and path of the source file.
☆18Updated 2 years ago
Alternatives and similar repositories for dump-iphone-backup
Users that are interested in dump-iphone-backup are comparing it to the libraries listed below
Sorting:
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆19Updated 4 years ago
- Autopsy module that creates an encrypted or unencrypted iOS backup of iPhone or iPad and extracts files from them.☆65Updated 10 months ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆21Updated 4 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆21Updated 4 years ago
- Crack ios Restriction PassCode in Python☆34Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆29Updated 2 years ago
- Tool to Disable User Lock☆25Updated 2 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- Use this script to search through locally stored files for any Credit/Debit card details.☆28Updated 5 years ago
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆33Updated 2 years ago
- mift - a mobile image forensic toolkit☆45Updated last year
- Toutatis transform for maltego☆49Updated 2 years ago
- Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with inten…☆24Updated 4 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆23Updated 5 months ago
- A swiss army knife for pentesting networks☆21Updated 2 years ago
- A library that injects into SpringBoard and bruteforce the 4-digit lockscreen pin.☆10Updated 10 years ago
- Scripts and tool for iOS app reversing☆27Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Command line hacked-emails☆16Updated 4 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated 4 months ago
- It Map Social Media With Photo☆28Updated 3 years ago
- Automated Password Cracking Tool☆18Updated 4 years ago
- Some useful tools for a iOS Forensics.☆35Updated 6 years ago
- An open-source OSINT tool designed for cybersecurity professionals and threat intelligence analysts, enabling you to search, collect, and…☆34Updated last month
- Awesome-Cellular-Hacking☆66Updated 4 years ago
- The most available software’s for the tracking purpose of any cell phone user. Spy mobile tracker is compatible with any smart phone like…☆12Updated 9 years ago
- Emulation of application data in its original state.☆16Updated 2 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆24Updated 2 years ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆31Updated 2 years ago