mvt-project / mvtLinks
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
☆11,286Updated last week
Alternatives and similar repositories for mvt
Users that are interested in mvt are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise from Amnesty International's cyber investigations☆1,605Updated 6 months ago
- An HTTP toolkit for security research.☆6,993Updated 4 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,059Updated last month
- An open-source digital image forensic toolset☆2,936Updated last month
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆11,537Updated this week
- Network Analysis Tool☆3,247Updated 2 years ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,912Updated last year
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆12,546Updated last month
- ☆1,271Updated last month
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,359Updated 6 years ago
- Information gathering framework for phone numbers☆14,477Updated 11 months ago
- 🏔 Love Freedom - ❌ Block Mass Surveillance☆10,333Updated this week
- Scanning APK file for URIs, endpoints & secrets.☆5,335Updated 3 months ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆8,922Updated 9 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,482Updated last month
- In-depth attack surface mapping and asset discovery☆13,165Updated this week
- Fast web fuzzer written in Go☆14,175Updated 2 months ago
- Web application fuzzer☆6,201Updated 10 months ago
- Powerful framework for rogue access point attack.☆2,205Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,743Updated 3 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,400Updated this week
- (⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.☆8,416Updated 2 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,082Updated 10 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,881Updated last month
- OSINT tool for finding profiles by username☆2,380Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,401Updated this week
- CLOSE ACCESS DENIAL.☆1,496Updated this week
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆488Updated 2 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆4,146Updated this week
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Updated 2 years ago