mvt-project / mvtLinks
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
☆11,828Updated this week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigations☆1,627Updated 10 months ago
- An open-source digital image forensic toolset☆3,028Updated 3 months ago
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆2,868Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,633Updated last week
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆4,435Updated this week
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,470Updated 3 years ago
- IntelOwl: manage your Threat Intelligence at scale☆4,339Updated this week
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,156Updated last year
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,226Updated last year
- THIS REPO IS NOT MAINTAINED ANYMORE. Please see https://codeberg.org/tenacityteam/tenacity for Tenacity, which is maintained.☆6,669Updated 3 years ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,075Updated 2 years ago
- ☆1,278Updated 6 months ago
- Tool to find metadata and hidden information in the documents.☆3,328Updated 2 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆15,745Updated 10 months ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,480Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- The Deepfake Offensive Toolkit☆4,454Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆5,686Updated 2 months ago
- An HTTP toolkit for security research.☆8,953Updated 9 months ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,320Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,195Updated 5 months ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆33,051Updated 3 months ago
- ☆452Updated last year
- The pattern matching swiss knife☆9,177Updated last week
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,384Updated 8 months ago
- USB Keystroke Injection Protection☆546Updated 2 years ago
- A collection of several hundred online tools for OSINT☆7,098Updated 3 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,972Updated last year
- Network Analysis Tool☆3,292Updated 2 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago