mvt


Namemvt JSON
Version 2.5.3 PyPI version JSON
download
home_pagehttps://github.com/mvt-project/mvt
SummaryMobile Verification Toolkit
upload_time2024-04-19 15:31:40
maintainerNone
docs_urlNone
authorClaudio Guarnieri
requires_python>=3.8
licenseMVT v1.1
keywords security mobile forensics malware
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            <p align="center">
     <img src="https://docs.mvt.re/en/latest/mvt.png" width="200" />
</p>

# Mobile Verification Toolkit

[![](https://img.shields.io/pypi/v/mvt)](https://pypi.org/project/mvt/)
[![Documentation Status](https://readthedocs.org/projects/mvt/badge/?version=latest)](https://docs.mvt.re/en/latest/?badge=latest)
[![CI](https://github.com/mvt-project/mvt/actions/workflows/python-package.yml/badge.svg)](https://github.com/mvt-project/mvt/actions/workflows/python-package.yml)
[![Downloads](https://pepy.tech/badge/mvt)](https://pepy.tech/project/mvt)

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.

It has been developed and released by the [Amnesty International Security Lab](https://securitylab.amnesty.org) in July 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/) along with [a technical forensic methodology](https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/). It continues to be maintained by Amnesty International and other contributors.

> **Note**
> MVT is a forensic research tool intended for technologists and investigators. It requires understanding digital forensics and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek reputable expert assistance.
>

### Indicators of Compromise

MVT supports using public [indicators of compromise (IOCs)](https://github.com/mvt-project/mvt-indicators) to scan mobile devices for potential traces of targeting or infection by known spyware campaigns. This includes IOCs published by [Amnesty International](https://github.com/AmnestyTech/investigations/) and other  research groups.

> **Warning**
> Public indicators of compromise are insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. Reliance on public indicators alone can miss recent forensic traces and give a false sense of security.
>
> Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence.
>
>Such support is available to civil society through [Amnesty International's Security Lab](https://securitylab.amnesty.org/get-help/?c=mvt_docs) or through our forensic partnership with [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/).

More information about using indicators of compromise with MVT is available in the [documentation](https://docs.mvt.re/en/latest/iocs/).

## Installation

MVT can be installed from sources or from [PyPI](https://pypi.org/project/mvt/) (you will need some dependencies, check the [documentation](https://docs.mvt.re/en/latest/install/)):

```
pip3 install mvt
```

For alternative installation options and known issues, please refer to the [documentation](https://docs.mvt.re/en/latest/install/) as well as [GitHub Issues](https://github.com/mvt-project/mvt/issues).


## Usage

MVT provides two commands `mvt-ios` and `mvt-android`. [Check out the documentation to learn how to use them!](https://docs.mvt.re/)


## License

The purpose of MVT is to facilitate the ***consensual forensic analysis*** of devices of those who might be targets of sophisticated mobile spyware attacks, especially members of civil society and marginalized communities. We do not want MVT to enable privacy violations of non-consenting individuals.  In order to achieve this, MVT is released under its own license. [Read more here.](https://docs.mvt.re/en/latest/license/)

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/mvt-project/mvt",
    "name": "mvt",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": "security, mobile, forensics, malware",
    "author": "Claudio Guarnieri",
    "author_email": "nex@nex.sx",
    "download_url": "https://files.pythonhosted.org/packages/0b/a7/e12932647247b7cd253698e6aa0d5f831700d3dd7688c366af85eb255b62/mvt-2.5.3.tar.gz",
    "platform": null,
    "description": "<p align=\"center\">\n     <img src=\"https://docs.mvt.re/en/latest/mvt.png\" width=\"200\" />\n</p>\n\n# Mobile Verification Toolkit\n\n[![](https://img.shields.io/pypi/v/mvt)](https://pypi.org/project/mvt/)\n[![Documentation Status](https://readthedocs.org/projects/mvt/badge/?version=latest)](https://docs.mvt.re/en/latest/?badge=latest)\n[![CI](https://github.com/mvt-project/mvt/actions/workflows/python-package.yml/badge.svg)](https://github.com/mvt-project/mvt/actions/workflows/python-package.yml)\n[![Downloads](https://pepy.tech/badge/mvt)](https://pepy.tech/project/mvt)\n\nMobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.\n\nIt has been developed and released by the [Amnesty International Security Lab](https://securitylab.amnesty.org) in July 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/) along with [a technical forensic methodology](https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/). It continues to be maintained by Amnesty International and other contributors.\n\n> **Note**\n> MVT is a forensic research tool intended for technologists and investigators. It requires understanding digital forensics and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek reputable expert assistance.\n>\n\n### Indicators of Compromise\n\nMVT supports using public [indicators of compromise (IOCs)](https://github.com/mvt-project/mvt-indicators) to scan mobile devices for potential traces of targeting or infection by known spyware campaigns. This includes IOCs published by [Amnesty International](https://github.com/AmnestyTech/investigations/) and other  research groups.\n\n> **Warning**\n> Public indicators of compromise are insufficient to determine that a device is \"clean\", and not targeted with a particular spyware tool. Reliance on public indicators alone can miss recent forensic traces and give a false sense of security.\n>\n> Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence.\n>\n>Such support is available to civil society through [Amnesty International's Security Lab](https://securitylab.amnesty.org/get-help/?c=mvt_docs) or through our forensic partnership with [Access Now\u2019s Digital Security Helpline](https://www.accessnow.org/help/).\n\nMore information about using indicators of compromise with MVT is available in the [documentation](https://docs.mvt.re/en/latest/iocs/).\n\n## Installation\n\nMVT can be installed from sources or from [PyPI](https://pypi.org/project/mvt/) (you will need some dependencies, check the [documentation](https://docs.mvt.re/en/latest/install/)):\n\n```\npip3 install mvt\n```\n\nFor alternative installation options and known issues, please refer to the [documentation](https://docs.mvt.re/en/latest/install/) as well as [GitHub Issues](https://github.com/mvt-project/mvt/issues).\n\n\n## Usage\n\nMVT provides two commands `mvt-ios` and `mvt-android`. [Check out the documentation to learn how to use them!](https://docs.mvt.re/)\n\n\n## License\n\nThe purpose of MVT is to facilitate the ***consensual forensic analysis*** of devices of those who might be targets of sophisticated mobile spyware attacks, especially members of civil society and marginalized communities. We do not want MVT to enable privacy violations of non-consenting individuals.  In order to achieve this, MVT is released under its own license. [Read more here.](https://docs.mvt.re/en/latest/license/)\n",
    "bugtrack_url": null,
    "license": "MVT v1.1",
    "summary": "Mobile Verification Toolkit",
    "version": "2.5.3",
    "project_urls": {
        "Homepage": "https://github.com/mvt-project/mvt"
    },
    "split_keywords": [
        "security",
        " mobile",
        " forensics",
        " malware"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "84e0001a9ef38ebc94bfac8b3133d56340308e896a58b836b803b773a5886cb6",
                "md5": "10a2734ffbad78f4cde8135743592927",
                "sha256": "f2682fa6b7f065f6612626e09ddd4efeb82c00dbe85195f19aa24c8296b60583"
            },
            "downloads": -1,
            "filename": "mvt-2.5.3-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "10a2734ffbad78f4cde8135743592927",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 221426,
            "upload_time": "2024-04-19T15:31:38",
            "upload_time_iso_8601": "2024-04-19T15:31:38.776354Z",
            "url": "https://files.pythonhosted.org/packages/84/e0/001a9ef38ebc94bfac8b3133d56340308e896a58b836b803b773a5886cb6/mvt-2.5.3-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "0ba7e12932647247b7cd253698e6aa0d5f831700d3dd7688c366af85eb255b62",
                "md5": "ffba0ca8b0ff916bf608283a760cad4c",
                "sha256": "5727877815b3d5a2a98e21a6be9da51c3629eb548e424457e9e78ae183344264"
            },
            "downloads": -1,
            "filename": "mvt-2.5.3.tar.gz",
            "has_sig": false,
            "md5_digest": "ffba0ca8b0ff916bf608283a760cad4c",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 109639,
            "upload_time": "2024-04-19T15:31:40",
            "upload_time_iso_8601": "2024-04-19T15:31:40.570015Z",
            "url": "https://files.pythonhosted.org/packages/0b/a7/e12932647247b7cd253698e6aa0d5f831700d3dd7688c366af85eb255b62/mvt-2.5.3.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-04-19 15:31:40",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "mvt-project",
    "github_project": "mvt",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "mvt"
}
        
Elapsed time: 0.29304s