MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
β12,397May 12, 2026Updated last week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigationsβ1,657Dec 16, 2024Updated last year
- π΅οΈββοΈ Offensive Google framework.β18,917Apr 10, 2026Updated last month
- β525Nov 25, 2024Updated last year
- Ghidra is a software reverse engineering (SRE) frameworkβ68,594Updated this week
- Collection of malware source code for a variety of platforms in an array of different programming languages.β18,233Sep 10, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential tracesβ¦β298Feb 4, 2026Updated 3 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ77,765Apr 22, 2026Updated 3 weeks ago
- Hunt down social media accounts by username across social networksβ83,419Updated this week
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and β¦β21,018May 11, 2026Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,743Apr 13, 2026Updated last month
- Index and collection of MVT compatibile indicators of compromise.β132Apr 8, 2026Updated last month
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β7,217Oct 31, 2023Updated 2 years ago
- An open-source digital image forensic toolsetβ3,139Updated this week
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β53,605Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β19,215May 11, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in β¦β70,971Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,133Mar 12, 2024Updated 2 years ago
- Information gathering framework for phone numbersβ16,430Jan 6, 2026Updated 4 months ago
- Find, verify, and analyze leaked credentialsβ26,288Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,847Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β28,713Updated this week
- A curated list of amazingly awesome OSINTβ26,341Updated this week
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,384May 6, 2026Updated last week
- Open source password manager - Proton Pass β’ AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- π± Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-deβ¦β1,562Jun 27, 2022Updated 3 years ago
- A new bootable USB solution.β76,590May 7, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.β6,002May 12, 2026Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β15,080Oct 6, 2025Updated 7 months ago
- A beacon generator using Cobalt Strike and a variety of tools.β448Aug 10, 2021Updated 4 years ago
- π A compiled checklist of 300+ tips for protecting digital security and privacy in 2026β21,449Feb 28, 2026Updated 2 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,802Jan 12, 2026Updated 4 months ago
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,548May 9, 2026Updated last week
- In-depth attack surface mapping and asset discoveryβ14,563Apr 17, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Mβ¦β3,822Apr 16, 2026Updated last month
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,575May 11, 2026Updated last week
- Scanning APK file for URIs, endpoints & secrets.β6,065Aug 20, 2025Updated 8 months ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sysβ¦β15,653May 11, 2026Updated last week
- Indicators of stalkerware appsβ358May 4, 2026Updated 2 weeks ago
- Linux OS for Azure 1P services and edge appliancesβ4,610Updated this week
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the mβ¦β13,301May 11, 2026Updated last week