Dexcalibur[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (+830.91%)
mobileAuditDjango application that performs SAST and Malware Analysis for Android APKs
Stars: ✭ 140 (+154.55%)
OvaaOversecured Vulnerable Android App
Stars: ✭ 152 (+176.36%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+3240%)
AdhritAndroid Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (+625.45%)
remote-adb-scanpure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-65.45%)
Rms Runtime Mobile SecurityRuntime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Stars: ✭ 1,194 (+2070.91%)
Mobile Security Framework MobsfMobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+18467.27%)
ApkleaksScanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+4821.82%)
EvabsAn open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (+214.55%)
RemoteNETExamine, create and interact with remote objects in other .NET processes.
Stars: ✭ 29 (-47.27%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (-18.18%)
vminspectTools for inspecting disk images
Stars: ✭ 25 (-54.55%)
android-webauthn-authenticatorA WebAuthn Authenticator for Android leveraging hardware-backed key storage and biometric user verification.
Stars: ✭ 101 (+83.64%)
harvestTool to sort large collections of files according to common typologies
Stars: ✭ 32 (-41.82%)
SDR-DetectorGSM Scanner, RTL-SDR, StingWatch, Meteor
Stars: ✭ 56 (+1.82%)
AppmemDumperForensics triage tool relying on Volatility and Foremost
Stars: ✭ 22 (-60%)
grapefruit(WIP) Runtime Application Instruments for iOS. Previously Passionfruit
Stars: ✭ 633 (+1050.91%)
powerauth-mobile-sdkPowerAuth Mobile SDK for adds capability for authentication and transaction signing into the mobile apps (ios, watchos, android).
Stars: ✭ 27 (-50.91%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-43.64%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-30.91%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-23.64%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (+121.82%)
flare-wmiNo description or website provided.
Stars: ✭ 399 (+625.45%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+372.73%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+1550.91%)
btrfscueRecover files from damaged BTRFS filesystems
Stars: ✭ 28 (-49.09%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (+145.45%)
mobiletrackersA repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads libraries.
Stars: ✭ 118 (+114.55%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (+83.64%)
Vol3xpVolatility Explorer Suit
Stars: ✭ 31 (-43.64%)
BadIntentIntercept, modify, repeat and attack Android's Binder transactions using Burp Suite
Stars: ✭ 316 (+474.55%)
yara-forensicsSet of Yara rules for finding files using magics headers
Stars: ✭ 115 (+109.09%)
GetConsoleHistoryAndOutputAn Incident Response tool to extract console command history and screen output buffer
Stars: ✭ 41 (-25.45%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+220%)
apkutila useful utility for android app security testing
Stars: ✭ 52 (-5.45%)
BlockHashLocRecover files using lists of blocks hashes, bypassing the File System entirely
Stars: ✭ 45 (-18.18%)
sqbriteSQBrite is a data recovery tool for SQLite databases
Stars: ✭ 27 (-50.91%)
qedThe scalable, auditable and high-performance tamper-evident log project
Stars: ✭ 87 (+58.18%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+307.27%)
dnslogMinimalistic DNS logging tool
Stars: ✭ 40 (-27.27%)
LogESPOpen Source SIEM (Security Information and Event Management system).
Stars: ✭ 162 (+194.55%)
DFIR-O365RCPowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (+187.27%)
Imm2VirtualThis is a GUI (for Windows 64 bit) for a procedure to virtualize your EWF(E01), DD (raw), AFF disk image file without converting it, directly with VirtualBox, forensically proof.
Stars: ✭ 40 (-27.27%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-41.82%)
MantOSLIFARS Networking Security GNU/Linux distro
Stars: ✭ 24 (-56.36%)
Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+20%)
mobilehacktoolsA repository for scripting a mobile attack toolchain
Stars: ✭ 61 (+10.91%)
ingest-fileIngestors extract the contents of mixed unstructured documents into structured (followthemoney) data.
Stars: ✭ 40 (-27.27%)