mvt-project / mvtLinks
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
☆11,650Updated this week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigations☆1,621Updated 9 months ago
- Wi-Fi Exploitation Framework☆2,606Updated 2 weeks ago
- Securely and anonymously share files, host websites, and chat with friends using the Tor network☆6,682Updated 2 months ago
- (⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.☆8,633Updated last month
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,156Updated last year
- An open-source digital image forensic toolset☆2,978Updated 2 months ago
- ☆1,277Updated 5 months ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆13,617Updated this week
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,277Updated 3 weeks ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,198Updated last week
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,950Updated 2 years ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,463Updated 3 years ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,203Updated 9 months ago
- Open-Source Phishing Toolkit☆13,169Updated last year
- An automated e-mail OSINT tool☆5,534Updated last year
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,296Updated 3 months ago
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆11,288Updated this week
- 🕵️♂️ Offensive Google framework.☆17,954Updated this week
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆11,521Updated last month
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,278Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆3,078Updated last week
- A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like …☆2,766Updated 2 years ago
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,964Updated 9 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,923Updated last year
- Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy☆5,034Updated 5 months ago
- All-in-One malware analysis tool.☆1,672Updated last month
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,485Updated 3 months ago
- Codebase to generate an msdt-follina payload☆1,623Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,731Updated last year
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆2,841Updated 2 months ago