mvt-project / mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
☆10,651Updated this week
Alternatives and similar repositories for mvt:
Users that are interested in mvt are comparing it to the libraries listed below
- Indicators of Compromise from Amnesty International's cyber investigations☆1,574Updated last month
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆13,507Updated last month
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,757Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆3,935Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,041Updated last week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆3,481Updated this week
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,371Updated 2 years ago
- Information gathering framework for phone numbers☆13,560Updated 6 months ago
- A self-hosted, ad-free, privacy-respecting metasearch engine☆9,759Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,000Updated this week
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,174Updated 6 months ago
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆9,430Updated this week
- 🕵️♂️ Offensive Google framework.☆15,980Updated last week
- A curated list of amazingly awesome OSINT☆19,818Updated 3 weeks ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,090Updated last month
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,103Updated 10 months ago
- Network Analysis Tool☆3,064Updated last year
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,402Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11,832Updated 4 months ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,127Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆29,869Updated 2 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,274Updated last year
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆4,847Updated last month
- The pattern matching swiss knife☆8,463Updated this week
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,308Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,141Updated last month
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,907Updated 2 years ago
- Daemon to ban hosts that cause multiple authentication errors☆12,870Updated 2 weeks ago