Welcome to the MVT Project! This open-source community is focused on developing tools to help to identify potential compromise of Android and iOS devices.
The primary projects include MVT and AndroidQF.
MVT is a powerful consensual forensic tool designed to help analyze mobile devices for signs of spyware. It provides:
- Support for both iOS and Android devices.
- Automated scans for traces of spyware, malware, or other malicious activities based on a set of community-maintained Indicators of Compromise (IOCs).
- Outputs data in JSON for use in manual threat hunting and further analysis.
Getting started by reading the MVT documentation!
AndroidQF (Android Quick Forensics) is a forensic data collection tool for Android devices.
No analysis is performed by AndroidQF itself. Data collected with AndroidQF can later be parsed and analysed using MVT. AndroidQF features include:
- Automated collection of Android forensic data which can be relevant for spyware forensics (Bugreport, Android backup etc.)
- Deploying on-device
collector
agent to reliably collect forensic data without relying on limited Android shell environments. - Collecting suspicious or unknown Android APK files from a device.
- Cross-platform support on Windows, Mac and Linux.
We welcome contributions from the community! Here’s how you can get involved:
- Read the Contribution Guidelines: Make sure to review our MVT Contribution Guidelines to understand the process.
- Open a Discussion: Have a feature request, bug report, or idea? Start a conversation in the Discussions section.
- Submit a Pull Request: If you’ve implemented a feature or fixed a bug, submit a PR for review.
This project is licensed under the MVT License.
We’re excited to have you on board and can’t wait to see how you contribute to the MVT Project! Together, we can make security and quality assurance accessible to all.