LockUp is an Android application that monitors the device for signs of attempts to image it using forensic tools like Cellebrite UFED. It does not require root access and relies on system events and known exploit staging locations to detect extraction attempts, responding with a factory reset if necessary.
FEATURES
SIMILAR TOOLS
Python package for processing and analyzing Zeek data with Pandas, scikit-learn, Kafka, and Spark, with offloading capabilities and improved data analysis features.
Extract local data storage of an Android application in one click.
StegSolve is a steganography analysis tool with image analysis features.
AVEVA is an industrial software provider offering engineering, operations, and data management solutions for operational technology environments across various industrial sectors.
Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.
Inspeckage is a dynamic analysis tool for Android applications offering insights into app behavior and real-time monitoring capabilities.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.
A security checklist app for your Mac that helps you with basic security hygiene and prevents 80% of problems.
A cross-platform software library for interacting with iOS devices without jailbreaking.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.