DMG2IMG is a tool which allows converting Apple compressed dmg archives to standard (hfsplus) image disk files. This tool handles zlib, bzip2, and LZFSE compressed dmg images. Usage: dmg2img [-l] [-p N] [-s] [-v] [-V] [-d] <input.dmg> [<output.img> | -] or dmg2img [-l] [-p N] [-s] [-v] [-V] [-d] -i <input.dmg> -o <output.img | -> Options: -s (silent) -v (verbose) -V (extremely verbose) -d (debug) -l (list partitions) -p N (extract only partition N) See the original README file for platform-specific instructions to open or mount the resulting output file. The original author is vu1tur, http://vu1tur.eu.org/dmg2img. This Git repository is maintained by Peter Wu at https://github.com/Lekensteyn/dmg2img based on imported tarballs. It includes bug and security fixes and further enhancements. Building Required packages: zlib1g-dev (zlib support) libbz2-dev (bzip2 support) libssl-dev (only required for vfdecrypt, not needed for dmg2img) LZFSE decompression support requires the LZFSE library which can be found at https://github.com/lzfse/lzfse/. As this library is not widely available on Linux distributions, it is not enabled by default. To build dmg2img: make dmg2img
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A forensic tool to find hidden processes and TCP/UDP ports by rootkits or other hidden techniques.
A Windows Registry hive extraction library that reads and writes Windows Registry 'hive' binary files.
A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
An open source digital forensic tool for processing and analyzing digital evidence with high performance and multiplatform support.
Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.
Digital investigation tool for extracting forensic data from computers and managing investigations.
A collection of tools for extracting and analyzing information from .git repositories
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.