casework / CASE-Implementation-UFED-XMLLinks
☆11Updated last year
Alternatives and similar repositories for CASE-Implementation-UFED-XML
Users that are interested in CASE-Implementation-UFED-XML are comparing it to the libraries listed below
Sorting:
- Tool to Disable User Lock☆25Updated 3 years ago
- Get files from Android directories☆11Updated 7 years ago
- mift - a mobile image forensic toolkit☆46Updated 2 years ago
- Phoneinfoga Maltego Transform☆125Updated 2 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆77Updated 7 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆24Updated 4 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆17Updated 3 years ago
- Awesome-Cellular-Hacking☆70Updated 4 years ago
- CameraDar hacks its way into RTSP CCTV cameras.☆11Updated 8 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆18Updated 2 years ago
- Python Code to Map Cell Towers From a Cellebrite Android Dump☆56Updated 6 years ago
- This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices☆152Updated 5 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆28Updated 8 months ago
- Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with inten…☆24Updated 4 years ago
- Toutatis transform for maltego☆52Updated 3 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆23Updated 5 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Updated last year
- How to set up and install Ss7 and Sigtran Adapt☆31Updated last year
- Venmo: Open Source Intelligence Investigation Tool☆56Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Updated 4 years ago
- Quidam maltego transform☆42Updated 5 years ago
- List of OSINT resources☆15Updated 5 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 6 years ago
- A set of social media OSINT tools that I use when participating in Trace Labs Search Party CTF☆75Updated 2 years ago
- A swiss army knife for pentesting networks☆23Updated 2 years ago
- List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов☆13Updated 2 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆23Updated 4 years ago
- androrat☆22Updated 6 years ago