SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆32Aug 6, 2019Updated 6 years ago
Alternatives and similar repositories for swaraVM
Users that are interested in swaraVM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mobile Forensic Academic Articles☆13Jun 8, 2017Updated 8 years ago
- Python scripts for doing Android or IOS mobile forensics☆26Sep 28, 2016Updated 9 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Aug 18, 2017Updated 8 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆117Feb 21, 2018Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆15Apr 1, 2015Updated 10 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- ☆12Mar 29, 2019Updated 6 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆23Mar 11, 2014Updated 12 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Provides metadata extraction for iOS, Android and Windows packages.☆38Apr 19, 2023Updated 2 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- ☆15Aug 20, 2019Updated 6 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆152Mar 20, 2024Updated 2 years ago
- iOS forensics utility☆13May 8, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆15Jun 17, 2016Updated 9 years ago
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a U…☆13Feb 8, 2022Updated 4 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- Bypass iOS PIN Passcode☆10May 16, 2014Updated 11 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- services-names-wordlist☆85Oct 31, 2025Updated 4 months ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android …☆11Mar 4, 2014Updated 12 years ago
- Insert, Retrieve, Update and Delete data from SQLite database in Android☆12Jan 6, 2012Updated 14 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆176Mar 31, 2023Updated 2 years ago
- SIM Card Forensic Acquisition using USB to Serial readers☆38Sep 17, 2014Updated 11 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Oct 1, 2020Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago