Index and collection of MVT compatibile indicators of compromise.
☆132Apr 8, 2026Updated last month
Alternatives and similar repositories for mvt-indicators
Users that are interested in mvt-indicators are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces…☆163Updated this week
- Indicators of stalkerware apps☆358May 4, 2026Updated 2 weeks ago
- Tool to decrypt tdata files.☆12Aug 15, 2023Updated 2 years ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,397May 12, 2026Updated last week
- ☆460Feb 24, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The Sysdiagnose Analysis Framework (SAF) is a framework that can be used to convert the Apple sysdiagnose diagnostic archive data to a st…☆259Updated this week
- Feed of phish-domains found by Validin Threat Intelligince Platform☆37Updated this week
- Output from running Yarden's sandblaster on an iPhone15,2's iOS17 kernelcaches☆19Aug 7, 2024Updated last year
- A friendly DNSSEC signing solution: sensible defaults, controllability, observability and flexibility.☆60Updated this week
- No longer maintained. Please refer to Google Threat Intelligence / Virus Total collections.☆65Apr 3, 2026Updated last month
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Indicators of Compromise from Amnesty International's cyber investigations☆1,657Dec 16, 2024Updated last year
- A Python application which is used to pull data from the United States Federal Treasury API.☆16Jul 15, 2021Updated 4 years ago
- Small .exe to batch convert .heic to .jpg; place in any image folder.☆18Sep 25, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forb…☆35Nov 27, 2023Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- ☆21Jun 6, 2023Updated 2 years ago
- Scripts to parse various iOS sysdiagnose logs. Based upon the forensic research of Mattia Epifani, Heather Mahalik and Cheeky4n6monkey.☆206Oct 29, 2022Updated 3 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆24Mar 1, 2021Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 5 years ago
- A python library for building and using hash databases.☆22May 11, 2026Updated last week
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆22Sep 30, 2024Updated last year
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆43Oct 24, 2025Updated 6 months ago
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 5 months ago
- My Linux profiles built for Volatility 2/3☆11Oct 11, 2025Updated 7 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- I AM SHER LOCKED. Dashboard for Appknox Users.☆21Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A sample Swift Bazel project that implements test code coverage reporting☆13Dec 4, 2020Updated 5 years ago
- Quick and dirty script to parse bplists with Ruby☆14Oct 29, 2020Updated 5 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Mar 7, 2023Updated 3 years ago
- Reversing the Apple sandbox☆186Dec 7, 2025Updated 5 months ago
- Walks through the 4-level paging structures in Windows x64☆14Feb 12, 2023Updated 3 years ago
- Simple bot visitor service for XSS challenges in CTF☆11Nov 9, 2022Updated 3 years ago