Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with intent to steal valuable artifacts from the National Gallery of Art.
☆25Aug 30, 2021Updated 4 years ago
Alternatives and similar repositories for iPhone_Forensics
Users that are interested in iPhone_Forensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LulzSec FB Cracker ToolKit Bruter V0.1 tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTP…☆11Aug 14, 2017Updated 8 years ago
- no longer maintained☆18Feb 22, 2018Updated 8 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆14Jan 6, 2021Updated 5 years ago
- research chrome stored databases - dumping all urls☆42Nov 11, 2017Updated 8 years ago
- Script to create Debian Squeeze & Wheezy Amazon Machine Images (AMIs) and Google Compute Engine images☆35Jun 17, 2014Updated 11 years ago
- Parse an iOS6+ sms.db file and analyse it.☆19Jan 3, 2016Updated 10 years ago
- A simple Cocoa sqlite viewer and a QuickLook plugin to view sqlite database files.☆12Feb 17, 2014Updated 12 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Dec 5, 2018Updated 7 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Python utilities related to plists☆55Oct 28, 2025Updated 4 months ago
- Database Viewer for SQLite, MySQL, PostgreSQL, designed for BigData analysis☆12Apr 20, 2019Updated 6 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- Fast iOS executable dumper☆28Jun 25, 2014Updated 11 years ago
- location hacking and phone number hacking☆67Dec 24, 2020Updated 5 years ago
- Various Topics☆18Apr 30, 2025Updated 10 months ago
- Imporoved version of recovery.py☆14Jan 21, 2026Updated 2 months ago
- Some useful tools for a iOS Forensics.☆37Jan 6, 2019Updated 7 years ago
- EvilDroid+TheFatRat☆15Oct 18, 2018Updated 7 years ago
- CVE-2022-46718: an app may be able to read sensitive location information.☆27May 1, 2023Updated 2 years ago
- ☆13Feb 19, 2024Updated 2 years ago
- JSBox Node.js example: ts-playground☆16Dec 10, 2019Updated 6 years ago
- Knative common scripts.☆24Updated this week
- Command line tool to monitor network connections.☆30Apr 6, 2022Updated 3 years ago
- dump network packet and log to database☆10Jul 24, 2022Updated 3 years ago
- Cybertalents challenges write-ups☆12Apr 4, 2021Updated 4 years ago
- A collection of tools that dump MIDI to a variety of formats☆30Feb 4, 2021Updated 5 years ago
- from system.data.sqlite.org☆12Jan 20, 2014Updated 12 years ago
- A tool to extract local data storage of an Android application in one click.☆20Dec 8, 2018Updated 7 years ago
- Android trojan streamer client jar☆17Sep 11, 2016Updated 9 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆17Dec 23, 2024Updated last year
- A tool to automatically verify Apple ID's☆22Oct 29, 2018Updated 7 years ago
- Information Gathering Tool☆24Aug 16, 2013Updated 12 years ago
- ☆22Oct 3, 2019Updated 6 years ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- A visual developer tool for inspecting your iOS application data structures.☆13Jan 12, 2022Updated 4 years ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆16Sep 13, 2019Updated 6 years ago