||14 hours ago|
|.github/workflows||2 months ago|
|dev||2 months ago|
|docs||1 week ago|
|mvt||14 hours ago|
|.gitignore||2 months ago|
|.readthedocs.yaml||2 months ago|
|AUTHORS||2 months ago|
|Dockerfile||1 month ago|
|LICENSE||2 months ago|
|Makefile||2 months ago|
|README.md||1 month ago|
|mkdocs.yml||1 month ago|
|setup.py||4 weeks ago|
Mobile Verification Toolkit
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidence.
Warning: MVT is a forensic research tool intended for technologists and investigators. Using it requires understanding the basics of forensic analysis and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek expert assistance.
pip3 install mvt
Alternatively, you can decide to run MVT and all relevant tools through a Docker container.
Please note: MVT is best run on Linux or Mac systems. It does not currently support running natively on Windows.
MVT provides two commands
mvt-android. Check out the documentation to learn how to use them!
The purpose of MVT is to facilitate the consensual forensic analysis of devices of those who might be targets of sophisticated mobile spyware attacks, especially members of civil society and marginalized communities. We do not want MVT to enable privacy violations of non-consenting individuals. In order to achieve this, MVT is released under its own license. Read more here.