PeterUpfold / dump-iphone-backupLinks
Dump an encrypted iPhone backup to a folder for analysis of any artifacts, organised by domain and path of the source file.
☆18Updated 2 years ago
Alternatives and similar repositories for dump-iphone-backup
Users that are interested in dump-iphone-backup are comparing it to the libraries listed below
Sorting:
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆18Updated 4 years ago
- Autopsy module that creates an encrypted or unencrypted iOS backup of iPhone or iPad and extracts files from them.☆69Updated last year
- Crack ios Restriction PassCode in Python☆37Updated 5 years ago
- Tool to Disable User Lock☆25Updated 3 years ago
- ☆11Updated last year
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆29Updated 2 years ago
- The most available software’s for the tracking purpose of any cell phone user. Spy mobile tracker is compatible with any smart phone like…☆12Updated 10 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆22Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆24Updated 5 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- mift - a mobile image forensic toolkit☆46Updated 2 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆28Updated 7 months ago
- Some useful tools for a iOS Forensics.☆33Updated 6 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Updated 8 years ago
- A swiss army knife for pentesting networks☆23Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 4 years ago
- Scripts and tool for iOS app reversing☆27Updated 4 years ago
- CameraDar hacks its way into RTSP CCTV cameras.☆11Updated 8 years ago
- An open-source OSINT tool designed for cybersecurity professionals and threat intelligence analysts, enabling you to search, collect, and…☆38Updated 2 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆59Updated 10 months ago
- Automated Password Cracking Tool☆17Updated 5 years ago
- Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like P…☆29Updated 2 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 2 months ago
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆33Updated 2 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆23Updated 2 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- Lightweight reverse phone lookup single page application built with Vue, Webpack, Babel, Element-UI, and Bootstrap 4. Using the Whitepage…☆12Updated 7 years ago
- BlueHunter is bluetooth device hacking framework☆23Updated last year
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Updated 5 years ago