PeterUpfold / dump-iphone-backupLinks
Dump an encrypted iPhone backup to a folder for analysis of any artifacts, organised by domain and path of the source file.
☆17Updated last year
Alternatives and similar repositories for dump-iphone-backup
Users that are interested in dump-iphone-backup are comparing it to the libraries listed below
Sorting:
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆17Updated 4 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆19Updated 4 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆28Updated 2 years ago
- Automated Password Cracking Tool☆18Updated 4 years ago
- ☆9Updated 7 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆9Updated 4 years ago
- The most available software’s for the tracking purpose of any cell phone user. Spy mobile tracker is compatible with any smart phone like…☆11Updated 9 years ago
- A swiss army knife for pentesting networks☆20Updated 2 years ago
- CameraDar hacks its way into RTSP CCTV cameras.☆10Updated 7 years ago
- A Network Packet and Traffic Interceptor For Linux. Spoof ARP & Wiretap A Network.☆11Updated 3 years ago
- A library that injects into SpringBoard and bruteforce the 4-digit lockscreen pin.☆9Updated 10 years ago
- Android-PIN-Bruteforce☆18Updated 3 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆20Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Autopsy module that creates an encrypted or unencrypted iOS backup of iPhone or iPad and extracts files from them.☆64Updated 7 months ago
- Gmail shell, for hackers execute commands via gmail☆19Updated 4 years ago
- A Domain-Recon Automated Tool.☆14Updated 2 years ago
- mift - a mobile image forensic toolkit☆45Updated last year
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆23Updated 3 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆22Updated 2 years ago
- Tool to Disable User Lock☆26Updated 2 years ago
- Instagram-Py Instagram-py performs slick brute force attack on Instagram without any type of password limiting and also resumes your atta…☆10Updated 3 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆18Updated last year
- An open-source OSINT tool designed for cybersecurity professionals and threat intelligence analysts, enabling you to search, collect, and…☆29Updated 2 weeks ago
- Tools ini adalah tools untuk otomatis mengambil gambar wajah dari Device lain☆12Updated 6 years ago
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆27Updated 6 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated last month
- Automated Mass Exploiter☆12Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago