mvt-project / mvtLinks
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
โ11,242Updated this week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigationsโ1,601Updated 5 months ago
- ๐ต๏ธโโ๏ธ Offensive Google framework.โ16,557Updated 3 weeks ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.โ12,573Updated this week
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searchingโ2,991Updated last month
- an awesome list of honeypot resourcesโ9,378Updated 2 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password ๐ก๏ธโ6,109Updated 2 weeks ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.โ4,700Updated 7 months ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisโ31,376Updated 3 weeks ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounโฆโ8,757Updated 3 weeks ago
- ๐ A collection of interesting, funny, and depressing search queries to plug into shodan.io ๐ฉโ๐ปโ6,421Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envโฆโ7,339Updated 3 weeks ago
- Scanning APK file for URIs, endpoints & secrets.โ5,312Updated 2 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.โ14,530Updated 5 months ago
- Attack Surface Management Platformโ8,793Updated this week
- The Browser Exploitation Framework Projectโ10,238Updated last week
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the mโฆโ10,450Updated this week
- Hide secrets with invisible characters in plain text securely using passwords ๐ง๐ปโโ๏ธโญโ3,546Updated 8 months ago
- Canarytokens helps track activity and actions on your network.โ1,850Updated this week
- ๐ A compiled checklist of 300+ tips for protecting digital security and privacy in 2024โ18,657Updated last month
- Autopsyยฎ is a digital forensics platform and graphical interface to The Sleuth Kitยฎ and other digital forensics tools. It can be used by โฆโ2,691Updated 3 weeks ago
- โ2,662Updated last year
- ๐ฑ Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-deโฆโ1,424Updated 2 years ago
- Real-time HTTP Intrusion Detectionโ3,050Updated last year
- A little tool to play with Windows securityโ20,240Updated 3 weeks ago
- Loki - Simple IOC and YARA Scannerโ3,552Updated 6 months ago
- Metasploit Frameworkโ35,651Updated this week
- Tracking interesting Linux (and UNIX) malware. Send PRsโ1,180Updated 3 weeks ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Poโฆโ3,211Updated 4 months ago
- A collection of several hundred online tools for OSINTโ6,420Updated last week
- Hunt down social media accounts by username across social networksโ65,836Updated last month