mvt-project / mvtLinks
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
☆11,505Updated this week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigations☆1,611Updated 8 months ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,058Updated 8 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,981Updated last week
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,145Updated last year
- SSH tarpit that slowly sends an endless banner☆8,254Updated last year
- An open-source digital image forensic toolset☆2,967Updated last month
- Official git repo for iodine dns tunnel☆7,057Updated 3 months ago
- Exploitation Framework for Embedded Devices☆12,706Updated 2 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,980Updated last year
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,108Updated last month
- ☆1,274Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,620Updated 6 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,226Updated this week
- An HTTP toolkit for security research.☆8,116Updated 6 months ago
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆8,165Updated last week
- Reverse Engineer's Toolkit☆5,038Updated 3 months ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,326Updated last week
- A pretty sweet vulnerability scanner☆4,142Updated 10 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,091Updated last month
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,691Updated 3 years ago
- Network Analysis Tool☆3,271Updated 2 years ago
- ⚠️ Browser fingerprinting via favicon!☆4,701Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,136Updated 2 weeks ago
- Never ever ever use pixelation as a redaction technique☆8,105Updated last year
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,132Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆5,400Updated 4 months ago
- Information gathering framework for phone numbers☆14,832Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,971Updated 9 months ago
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆10,832Updated this week
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,185Updated 3 months ago