MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
β12,169Feb 19, 2026Updated last week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigationsβ1,642Dec 16, 2024Updated last year
- π΅οΈββοΈ Offensive Google framework.β18,465Feb 5, 2026Updated 3 weeks ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.β17,858Sep 10, 2025Updated 5 months ago
- Ghidra is a software reverse engineering (SRE) frameworkβ64,981Updated this week
- Hunt down social media accounts by username across social networksβ73,118Feb 24, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ75,488Feb 16, 2026Updated 2 weeks ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β16,768Dec 15, 2024Updated last year
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and β¦β20,479Feb 3, 2026Updated last month
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β7,153Oct 31, 2023Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,111Mar 12, 2024Updated last year
- π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.β52,699Feb 13, 2026Updated 2 weeks ago
- An open-source digital image forensic toolsetβ3,097Jul 14, 2025Updated 7 months ago
- Information gathering framework for phone numbersβ15,957Jan 6, 2026Updated last month
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β18,883Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in β¦β69,062Feb 24, 2026Updated last week
- Find, verify, and analyze leaked credentialsβ24,779Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ34,190Updated this week
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ21,565Jan 12, 2026Updated last month
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,194Feb 24, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.β5,844Updated this week
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,078Mar 5, 2025Updated 11 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β13,287Updated this week
- π A compiled checklist of 300+ tips for protecting digital security and privacy in 2024β20,799Jun 28, 2025Updated 8 months ago
- A curated list of amazingly awesome OSINTβ24,940Feb 4, 2026Updated 3 weeks ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshβ¦β3,547Jan 20, 2026Updated last month
- Infection Monkey - An open-source adversary emulation platformβ6,956May 1, 2025Updated 10 months ago
- Open Cyber Threat Intelligence Platformβ8,893Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,645Oct 6, 2025Updated 4 months ago
- IntelOwl: manage your Threat Intelligence at scaleβ4,467Updated this week
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the mβ¦β12,626Updated this week
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sysβ¦β15,339Jan 28, 2026Updated last month
- In-depth attack surface mapping and asset discoveryβ14,193Updated this week
- A black hole for Internet advertisementsβ55,877Feb 24, 2026Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,452Feb 14, 2026Updated 2 weeks ago
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential tracesβ¦β294Feb 4, 2026Updated 3 weeks ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.β12,917Updated this week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.β25,375Jun 5, 2025Updated 8 months ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β3,979Apr 16, 2025Updated 10 months ago
- Scanning APK file for URIs, endpoints & secrets.β5,974Aug 20, 2025Updated 6 months ago