MalConfScan
andriller
Our great sponsors
MalConfScan | andriller | |
---|---|---|
1 | 3 | |
468 | 1,246 | |
0.6% | - | |
3.3 | 1.8 | |
4 months ago | almost 2 years ago | |
Python | Python | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MalConfScan
andriller
- Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
-
Are there any free software out there for smartphone forensic?
For Android check andriller
- Noob here, any help will be greatly appreciated.
What are some alternatives?
maltrail - Malicious traffic detection system
android-keyboard-gadget - Convert your Android device into USB keyboard/mouse, control your PC from your Android device remotely, including BIOS/bootloader.
volatility - An advanced memory forensics framework
WhatsDump - Extract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
wifiphisher - The Rogue Access Point Framework
kivy - Open source UI framework written in Python, running on Windows, Linux, macOS, Android and iOS
hosts - 🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
oletools - oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
timesketch - Collaborative forensic timeline analysis
vss_carver - Carves and recreates VSS catalog and store from Windows disk image.
mvt - MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.