Skip to main content

Mobile Verification Toolkit

Project description

Mobile Verification Toolkit

Documentation Status CI Downloads

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.

It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus Project along with a technical forensic methodology. It continues to be maintained by Amnesty International and other contributors.

Note MVT is a forensic research tool intended for technologists and investigators. It requires understanding digital forensics and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek reputable expert assistance.

Indicators of Compromise

MVT supports using public indicators of compromise (IOCs) to scan mobile devices for potential traces of targeting or infection by known spyware campaigns. This includes IOCs published by Amnesty International and other research groups.

Warning Public indicators of compromise are insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. Reliance on public indicators alone can miss recent forensic traces and give a false sense of security.

Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence.

Such support is available to civil society through Amnesty International's Security Lab or through our forensic partnership with Access Now’s Digital Security Helpline.

More information about using indicators of compromise with MVT is available in the documentation.

Installation

MVT can be installed from sources or from PyPI (you will need some dependencies, check the documentation):

pip3 install mvt

For alternative installation options and known issues, please refer to the documentation as well as GitHub Issues.

Usage

MVT provides two commands mvt-ios and mvt-android. Check out the documentation to learn how to use them!

License

The purpose of MVT is to facilitate the consensual forensic analysis of devices of those who might be targets of sophisticated mobile spyware attacks, especially members of civil society and marginalized communities. We do not want MVT to enable privacy violations of non-consenting individuals. In order to achieve this, MVT is released under its own license. Read more here.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mvt-2.7.0.tar.gz (119.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mvt-2.7.0-py3-none-any.whl (205.8 kB view details)

Uploaded Python 3

File details

Details for the file mvt-2.7.0.tar.gz.

File metadata

  • Download URL: mvt-2.7.0.tar.gz
  • Upload date:
  • Size: 119.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.1

File hashes

Hashes for mvt-2.7.0.tar.gz
Algorithm Hash digest
SHA256 8f9be4d2b7a856237f377ab438343bd7f4dfb593b2a776e40ab81125a97c9856
MD5 9fe79f8b2552fd359e0d7cdacae73de5
BLAKE2b-256 5af4e0dc65c4e10dad7533a48a10321cdf4b49a1ecc669eeeda0f42a2185cc68

See more details on using hashes here.

File details

Details for the file mvt-2.7.0-py3-none-any.whl.

File metadata

  • Download URL: mvt-2.7.0-py3-none-any.whl
  • Upload date:
  • Size: 205.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.1

File hashes

Hashes for mvt-2.7.0-py3-none-any.whl
Algorithm Hash digest
SHA256 34a44efe99fabb31432b58a354fa05057697a8693a6ba709630d5dcdd443b248
MD5 bfc55bdef3a20d95bfb8f4ef8d9fbf38
BLAKE2b-256 1d598e425d27f1d09588683bc741db97d166d178ee9324140c9131c250252065

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page