MVT is a forensic tool to look for signs of infection in smartphone devices
Go to file
Martin L. Fällman 5ce8035820 Add Sublime Text project files to .gitignore 2022-03-25 20:16:20 +01:00
.github/workflows Add CI and downloads page 2022-02-02 12:45:06 +01:00
dev Updated copyright notice 2022-01-30 20:15:01 +01:00
docs Updates the documentation 2022-03-08 14:17:41 +01:00
mvt Fix path error when relative '.' used as backup source directory 2022-03-20 15:56:13 +01:00
tests Updating flake8 config and fixed some violations 2022-03-18 11:10:06 +01:00
.flake8 Updating flake8 config and fixed some violations 2022-03-18 11:10:06 +01:00
.gitignore Add Sublime Text project files to .gitignore 2022-03-25 20:16:20 +01:00
.readthedocs.yaml Improves documentation 2021-07-18 16:33:34 +02:00
AUTHORS More explicit copyright and licensing notes 2021-08-01 21:11:08 +02:00
Dockerfile Install libimobiledevice-glue from source 2021-09-12 18:28:17 -07:00
LICENSE Updated LICENSE 2021-07-25 12:01:23 +02:00
Makefile First commit 2021-07-16 08:05:01 +02:00
README.md Add CI and downloads page 2022-02-02 12:45:06 +01:00
mkdocs.yml Updated documentation on mvt-android 2021-08-17 16:36:48 +02:00
public_indicators.json Add command to download latest public indicators 2022-01-07 16:38:04 +01:00
setup.py Replaces pyaes with cryptography and reorganize backup parser code 2022-03-04 15:05:10 +01:00

README.md

Mobile Verification Toolkit

Documentation Status CI Downloads

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.

It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidence.

Warning: MVT is a forensic research tool intended for technologists and investigators. Using it requires understanding the basics of forensic analysis and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek expert assistance.

Installation

MVT can be installed from sources or from PyPi (you will need some dependencies, check the documentation):

pip3 install mvt

Alternatively, you can decide to run MVT and all relevant tools through a Docker container.

Please note: MVT is best run on Linux or Mac systems. It does not currently support running natively on Windows.

Usage

MVT provides two commands mvt-ios and mvt-android. Check out the documentation to learn how to use them!

License

The purpose of MVT is to facilitate the consensual forensic analysis of devices of those who might be targets of sophisticated mobile spyware attacks, especially members of civil society and marginalized communities. We do not want MVT to enable privacy violations of non-consenting individuals. In order to achieve this, MVT is released under its own license. Read more here.