mvt-project / mvtLinks
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
β12,079Updated this week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigationsβ1,640Updated last year
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β7,144Updated 2 years ago
- An open-source digital image forensic toolsetβ3,094Updated 6 months ago
- Hunt down social media accounts by username across social networksβ72,433Updated last week
- Β« usbkill Β» is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.β4,570Updated last year
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.β3,168Updated 2 years ago
- π± Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-deβ¦β1,511Updated 3 years ago
- π΅οΈββοΈ Offensive Google framework.β18,382Updated this week
- Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexyβ5,390Updated 9 months ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with theβ¦β10,137Updated last year
- Build your own 'AirTags' π· today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.β12,631Updated last year
- Securely and anonymously share files, host websites, and chat with friends using the Tor networkβ6,878Updated 2 months ago
- Information gathering framework for phone numbersβ15,796Updated last month
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,109Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,563Updated 4 months ago
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nicknβ¦β12,206Updated 5 months ago
- An OSINT tool to search for accounts by username and email in social networks.β5,586Updated 6 months ago
- A collection of awesome security hardening guides, tools and other resourcesβ6,100Updated 3 weeks ago
- π‘π You are being watched. Protect your privacy against global mass surveillance.β3,144Updated 3 years ago
- File formats dissections and more...β11,386Updated last year
- π΅οΈββοΈ Collect a dossier on a person by username from thousands of sitesβ18,967Updated this week
- EMBA - The firmware security analyzerβ3,353Updated this week
- A curated list of amazingly awesome OSINTβ24,641Updated last week
- A very small, very simple, yet very secure encryption tool.β2,518Updated 5 months ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.β5,007Updated last year
- Malicious traffic detection systemβ8,223Updated this week
- A temporary email right from your terminal written in POSIX shβ4,165Updated last year
- An evolving how-to guide for securing a Linux server.β24,535Updated last year
- HiddenVM β Use any desktop OS without leaving a trace.β2,638Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,209Updated 9 months ago