Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidence. MVT is a forensic research tool intended for technologists and investigators. Using it requires understanding the basics of forensic analysis and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek expert assistance. Compare extracted records to a provided list of malicious indicators in STIX2 format. Generate JSON logs of extracted records, and separate JSON logs of all detected malicious traces.

Features

  • MVT provides two commands mvt-ios and mvt-android
  • MVT is a forensic research tool intended for technologists and investigators
  • Simplify and automate the process of gathering forensic traces
  • Identify a potential compromise of Android and iOS devices
  • It has been developed and released by the Amnesty International Security Lab
  • Requires understanding the basics of forensic analysis and using command-line tools
  • Decrypt encrypted iOS backups
  • Process and parse records from numerous iOS system and apps databases, logs and system analytics
  • Extract installed applications from Android devices
  • Generate a unified chronological timeline of extracted records, along with a timeline all detected malicious traces

Project Samples

Project Activity

See All Activity >

Categories

Security

License

MIT License

Follow Mobile Verification Toolkit

Mobile Verification Toolkit Web Site

Other Useful Business Software
Build Securely on Azure with Proven Frameworks Icon
Build Securely on Azure with Proven Frameworks

Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Mobile Verification Toolkit!

Additional Project Details

Operating Systems

Android, Apple iPhone, Linux, Mac, Windows

Programming Language

Python

Related Categories

Python Security Software

Registered

2023-05-25