MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
β12,250Apr 1, 2026Updated this week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigationsβ1,650Dec 16, 2024Updated last year
- π΅οΈββοΈ Offensive Google framework.β18,621Mar 14, 2026Updated 3 weeks ago
- Ghidra is a software reverse engineering (SRE) frameworkβ66,637Updated this week
- Collection of malware source code for a variety of platforms in an array of different programming languages.β17,931Sep 10, 2025Updated 6 months ago
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential tracesβ¦β296Feb 4, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ76,678Mar 16, 2026Updated 3 weeks ago
- Hunt down social media accounts by username across social networksβ79,713Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β17,238Dec 15, 2024Updated last year
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and β¦β20,741Mar 30, 2026Updated last week
- Index and collection of MVT compatibile indicators of compromise.β129Mar 16, 2026Updated 3 weeks ago
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β7,166Oct 31, 2023Updated 2 years ago
- An open-source digital image forensic toolsetβ3,118Jul 14, 2025Updated 8 months ago
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β53,086Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in β¦β70,044Updated this week
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β19,019Mar 29, 2026Updated last week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,115Mar 12, 2024Updated 2 years ago
- Information gathering framework for phone numbersβ16,170Jan 6, 2026Updated 3 months ago
- Find, verify, and analyze leaked credentialsβ25,338Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,485Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,799Updated this week
- A curated list of amazingly awesome OSINTβ25,644Updated this week
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,285Mar 5, 2025Updated last year
- π± Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-deβ¦β1,539Jun 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A new bootable USB solution.β75,415Feb 1, 2026Updated 2 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.β5,927Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,816Oct 6, 2025Updated 6 months ago
- A beacon generator using Cobalt Strike and a variety of tools.β448Aug 10, 2021Updated 4 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ22,357Jan 12, 2026Updated 2 months ago
- π A compiled checklist of 300+ tips for protecting digital security and privacy in 2026β21,095Feb 28, 2026Updated last month
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,497Updated this week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Mβ¦β3,722Mar 21, 2026Updated 2 weeks ago
- In-depth attack surface mapping and asset discoveryβ14,353Apr 1, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,422Updated this week
- Scanning APK file for URIs, endpoints & secrets.β6,012Aug 20, 2025Updated 7 months ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sysβ¦β15,476Jan 28, 2026Updated 2 months ago
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the mβ¦β12,911Mar 30, 2026Updated last week
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.β13,043Mar 11, 2026Updated 3 weeks ago
- Infection Monkey - An open-source adversary emulation platformβ6,980May 1, 2025Updated 11 months ago
- IntelOwl: manage your Threat Intelligence at scaleβ4,527Updated this week