Bypassing Android Pattern Lock
☆69Apr 16, 2014Updated 11 years ago
Alternatives and similar repositories for Android_Forensics
Users that are interested in Android_Forensics are comparing it to the libraries listed below
Sorting:
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- ADB Based Acquisition Tool for Android Forensics☆43Mar 30, 2021Updated 4 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Forensic data extraction and decoding tool for Android devices☆33Nov 7, 2013Updated 12 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- forgotten android password? no problem for ABL☆28Jan 8, 2025Updated last year
- USB Rubber ducky payload to bypass lock-screen on 5.x build (LMY48I) and below☆66Sep 24, 2015Updated 10 years ago
- A collection of scripts and tools I have authored to aid in Pentesting, provided under GNUv3, NOTE: I am not liable if you use them for i…☆34Oct 23, 2018Updated 7 years ago
- This website used for Bypass FRP ALL Android Devices☆30Aug 23, 2023Updated 2 years ago
- bypass secure solutions in smart way☆18Dec 8, 2022Updated 3 years ago
- For Bypass lock Screen On android | Tested On Android : 2..5☆22Jan 31, 2021Updated 5 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆116Feb 21, 2018Updated 8 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆48Jun 10, 2016Updated 9 years ago
- Command-line privilege elevation for Windows☆23Nov 27, 2016Updated 9 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- Only alternative tool to bypass frp for locked android. The average source is taken from the website magelangflasher.com☆22Oct 4, 2025Updated 4 months ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Control your device like battery level info,Tower location,Alarm,Device lock and Wiping using SMS. Another open source android app from M…☆12Jun 20, 2022Updated 3 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Mar 29, 2019Updated 6 years ago
- Open source Android Forensics app and framework☆390Aug 14, 2015Updated 10 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Aug 18, 2017Updated 8 years ago
- Drone detection using the computer's wireless network adapter☆13Jul 10, 2019Updated 6 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- LuLu is the free macOS firewall☆12Jun 28, 2022Updated 3 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago