casework / CASE-Implementation-UFED-XMLLinks
☆10Updated 11 months ago
Alternatives and similar repositories for CASE-Implementation-UFED-XML
Users that are interested in CASE-Implementation-UFED-XML are comparing it to the libraries listed below
Sorting:
- mift - a mobile image forensic toolkit☆45Updated 2 years ago
- Tool to Disable User Lock☆26Updated 2 years ago
- Get files from Android directories☆11Updated 6 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆16Updated 3 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆25Updated 6 months ago
- Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with inten…☆24Updated 4 years ago
- List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов☆13Updated 2 years ago
- A set of social media OSINT tools that I use when participating in Trace Labs Search Party CTF☆73Updated last year
- An IOC collection for the Cellebrite UFED forensic toolkit.☆23Updated 4 years ago
- Phoneinfoga Maltego Transform☆126Updated last year
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆75Updated 7 years ago
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆18Updated 2 years ago
- Alfred is a advanced OSINT information gathering tool☆11Updated last week
- List of OSINT resources☆15Updated 4 years ago
- A swiss army knife for pentesting networks☆21Updated 2 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆29Updated 2 years ago
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆33Updated 2 years ago
- A email OSINT tool written in python3☆21Updated 2 years ago
- Toutatis transform for maltego☆53Updated 2 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 6 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆72Updated last year
- Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resourc…☆71Updated 3 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆22Updated 5 years ago
- This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices☆152Updated 5 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14Updated 4 years ago
- Quidam maltego transform☆42Updated 5 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Updated 8 months ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago