MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
β12,234Mar 18, 2026Updated this week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigationsβ1,645Dec 16, 2024Updated last year
- π΅οΈββοΈ Offensive Google framework.β18,535Mar 14, 2026Updated last week
- β525Nov 25, 2024Updated last year
- Ghidra is a software reverse engineering (SRE) frameworkβ65,820Mar 16, 2026Updated last week
- Collection of malware source code for a variety of platforms in an array of different programming languages.β17,891Sep 10, 2025Updated 6 months ago
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential tracesβ¦β296Feb 4, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ76,106Mar 16, 2026Updated last week
- Hunt down social media accounts by username across social networksβ73,965Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,014Dec 15, 2024Updated last year
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and β¦β20,617Updated this week
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β7,167Oct 31, 2023Updated 2 years ago
- Index and collection of MVT compatibile indicators of compromise.β127Mar 16, 2026Updated last week
- An open-source digital image forensic toolsetβ3,110Jul 14, 2025Updated 8 months ago
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β52,887Mar 16, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in β¦β69,539Mar 16, 2026Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β18,974Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,110Mar 12, 2024Updated 2 years ago
- Information gathering framework for phone numbersβ16,068Jan 6, 2026Updated 2 months ago
- Find, verify, and analyze leaked credentialsβ25,121Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,369Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,492Mar 16, 2026Updated last week
- A curated list of amazingly awesome OSINTβ25,414Updated this week
- A beacon generator using Cobalt Strike and a variety of tools.β448Aug 10, 2021Updated 4 years ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,254Mar 5, 2025Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.β5,890Updated this week
- A new bootable USB solution.β75,122Feb 1, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,721Oct 6, 2025Updated 5 months ago
- π± Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-deβ¦β1,535Jun 27, 2022Updated 3 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,186Jan 12, 2026Updated 2 months ago
- π A compiled checklist of 300+ tips for protecting digital security and privacy in 2026β20,940Feb 28, 2026Updated 3 weeks ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshβ¦β3,653Mar 11, 2026Updated last week
- In-depth attack surface mapping and asset discoveryβ14,282Updated this week
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,367Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,476Mar 2, 2026Updated 3 weeks ago
- Scanning APK file for URIs, endpoints & secrets.β5,996Aug 20, 2025Updated 7 months ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sysβ¦β15,418Jan 28, 2026Updated last month
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the mβ¦β12,804Updated this week
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.β12,995Mar 11, 2026Updated last week
- Linux OS for Azure 1P services and edge appliancesβ4,591Updated this week