PeterUpfold / dump-iphone-backupLinks
Dump an encrypted iPhone backup to a folder for analysis of any artifacts, organised by domain and path of the source file.
☆17Updated 2 years ago
Alternatives and similar repositories for dump-iphone-backup
Users that are interested in dump-iphone-backup are comparing it to the libraries listed below
Sorting:
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆18Updated 4 years ago
- Autopsy module that creates an encrypted or unencrypted iOS backup of iPhone or iPad and extracts files from them.☆64Updated 9 months ago
- A library that injects into SpringBoard and bruteforce the 4-digit lockscreen pin.☆10Updated 10 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆29Updated 2 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆20Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆21Updated 4 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated 3 months ago
- Tool to Disable User Lock☆25Updated 2 years ago
- It Map Social Media With Photo☆28Updated 2 years ago
- Automated Password Cracking Tool☆18Updated 4 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆16Updated 11 years ago
- The most available software’s for the tracking purpose of any cell phone user. Spy mobile tracker is compatible with any smart phone like…☆11Updated 9 years ago
- A swiss army knife for pentesting networks☆20Updated 2 years ago
- Crack ios Restriction PassCode in Python☆34Updated 4 years ago
- Toutatis transform for maltego☆46Updated 2 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆23Updated 4 months ago
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆24Updated 3 years ago
- An open-source OSINT tool designed for cybersecurity professionals and threat intelligence analysts, enabling you to search, collect, and…☆31Updated last month
- Automated Mass Exploiter☆11Updated 6 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆14Updated last year
- The state of the art network attack and monitoring framework.☆16Updated 7 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Analyses wifi probes (from mobile phones etc) and looks them up on wigle to provide possibly commonly visited locations of people near yo…☆28Updated 2 months ago
- Use this script to search through locally stored files for any Credit/Debit card details.☆28Updated 5 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆24Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- Awesome-Cellular-Hacking☆67Updated 4 years ago