Mobile Verification Toolkit (MVT) is a collection of forensic utilities developed by Amnesty International Security Lab for analyzing Android and iOS devices to identify potential security compromises. The toolkit automates the process of gathering forensic traces from mobile devices and supports scanning with public indicators of compromise (IOCs) to detect traces of known spyware campaigns and targeting activities. MVT is designed as a forensic research tool for technologists and investigators who have experience with digital forensics and command-line interfaces. The toolkit helps identify potential infections or targeting by malicious software on mobile devices. The tool focuses on mobile device forensics and requires technical expertise to operate effectively. It is not intended for end-user self-assessment but rather for professional forensic investigations and security research.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
Exterro is a data risk management platform that optimizes e-discovery, digital forensics, and cybersecurity compliance operations.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.