Python scripts for doing Android or IOS mobile forensics
☆25Sep 28, 2016Updated 9 years ago
Alternatives and similar repositories for Mobileforensics
Users that are interested in Mobileforensics are comparing it to the libraries listed below
Sorting:
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆116Feb 21, 2018Updated 8 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Aug 18, 2017Updated 8 years ago
- [Deprecated] Painless code injection☆52Oct 8, 2014Updated 11 years ago
- iOS forensic tool☆64Jun 10, 2014Updated 11 years ago
- Curated collections of the best links about Apple's Siri Shortcuts.☆19Dec 28, 2024Updated last year
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆174Mar 31, 2023Updated 2 years ago
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆151Mar 20, 2024Updated last year
- personal fork of OSINT tool recon-ng☆16Dec 17, 2017Updated 8 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- iOS Backup Examiner - A forensics tool for parsing an iOS backup's Info.plist file☆23Dec 5, 2016Updated 9 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 4 years ago
- Project to perform a forensics analysis on the Google Takeout by doing timelining☆33Apr 1, 2017Updated 8 years ago
- Forensic data extraction and decoding tool for Android devices☆33Nov 7, 2013Updated 12 years ago
- Jeopardy, for the folks at home 📺☆10Feb 12, 2024Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆11Jan 18, 2020Updated 6 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- A collection of small apps that will put shortcuts to various sideloaded android app in your Unknown Sources section of your main library…☆13Jul 27, 2019Updated 6 years ago
- Pulsar-plot of Strava runs in Swift 3☆12Apr 2, 2018Updated 7 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Dec 25, 2020Updated 5 years ago
- Watch YouTube without any ads! Skip ads prior to the actual video content and blocks any pop-up ads during the video within the frame☆13Feb 25, 2022Updated 4 years ago
- Passive subdomain enumeration tool for bug-bounty hunters & penetration testers.☆12Jan 10, 2021Updated 5 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Play CCGs such as Middle-Earth CCG (MECCG) in your browser. Plain and intuitive.☆11Jan 31, 2024Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- How-to: Pi-Hole + DNSCrypt + Anonymized DNS + Cloudflare DoH Setup on Raspberry Pi 4☆12Apr 1, 2020Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Cataclysm - Dark Days Ahead. A fork/variant of Cataclysm Roguelike by Whales.☆10Sep 11, 2019Updated 6 years ago
- Open-source intelligence (OSINT)☆15Mar 1, 2024Updated 2 years ago
- Play your favorite ccg☆18Dec 30, 2012Updated 13 years ago
- LOC Standards, Schemas, Stylesheets, etc.☆11Sep 30, 2025Updated 5 months ago
- ☆14Nov 12, 2021Updated 4 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago