mvt-project / mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
☆11,039Updated 2 weeks ago
Alternatives and similar repositories for mvt:
Users that are interested in mvt are comparing it to the libraries listed below
- Indicators of Compromise from Amnesty International's cyber investigations☆1,584Updated 3 months ago
- 🕵️♂️ Offensive Google framework.☆16,315Updated last month
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,837Updated last year
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,242Updated 9 months ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆8,530Updated 6 months ago
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆10,414Updated 8 months ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,212Updated 2 weeks ago
- An open-source digital image forensic toolset☆2,774Updated 4 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆14,014Updated 3 months ago
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,025Updated 9 months ago
- Incredibly fast crawler designed for OSINT.☆11,445Updated 7 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆17,149Updated last week
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆16,627Updated 4 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,971Updated 2 weeks ago
- SSH tarpit that slowly sends an endless banner☆7,593Updated 9 months ago
- Information gathering framework for phone numbers☆14,000Updated 9 months ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,397Updated 2 years ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,118Updated last year
- Metasploit Framework☆35,160Updated this week
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆18,508Updated last month
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆3,986Updated this week
- Automated Mass Exploiter☆5,094Updated last year
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,657Updated 2 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,077Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,405Updated last week
- Scanning APK file for URIs, endpoints & secrets.☆5,202Updated this week
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆2,602Updated last week
- The Browser Exploitation Framework Project☆10,112Updated this week
- an awesome list of honeypot resources☆9,026Updated 7 months ago
- Wi-Fi Exploitation Framework☆2,507Updated 6 months ago