mvt-project / mvtLinks
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
☆11,560Updated last week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigations☆1,615Updated 8 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆12,845Updated 3 months ago
- 🕵️♂️ Offensive Google framework.☆16,884Updated this week
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,948Updated 2 years ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.☆4,885Updated last year
- An open-source digital image forensic toolset☆2,974Updated last month
- Scanning APK file for URIs, endpoints & secrets.☆5,427Updated 2 weeks ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆17,538Updated this week
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,158Updated 3 weeks ago
- Information gathering framework for phone numbers☆14,989Updated last year
- Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes☆5,408Updated 2 years ago
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆11,125Updated this week
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,199Updated 8 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆4,236Updated this week
- Infection Monkey - An open-source adversary emulation platform☆6,859Updated 4 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,248Updated 8 months ago
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆19,564Updated 2 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,637Updated 2 years ago
- Hunt down social media accounts by username across social networks☆68,490Updated 4 months ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,197Updated 2 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,995Updated last year
- A pretty sweet vulnerability scanner☆4,140Updated 11 months ago
- ☆1,276Updated 4 months ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,456Updated 3 years ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆9,395Updated 11 months ago
- an awesome list of honeypot resources☆9,635Updated 5 months ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,254Updated 3 weeks ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,127Updated 6 months ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆932Updated 2 years ago
- Nikto web server scanner☆9,603Updated last month