iOS Frequent Locations Dumper Logo

iOS Frequent Locations Dumper

0
Free
Visit Website

Dump the contents of the StateModel#.archive files located in /private/var/mobile/Library/Caches/com.apple.routined/ Usage: python dump_freq_locs.py -output {k, c, e} <StateModel#.archive> Output Options: k - KML c - CSV e - Everything (KML & CSV) Dependencies: hexdump.py: https://pypi.python.org/pypi/hexdump ccl_bplist.py: https://github.com/cclgroupltd/ccl-bplist Sample Output: sample_dump_freq_locs.txt - Sample script output Related Information: http://www.mac4n6.com/blog/2015/12/20/parsing-the-ios-frequent-locations

FEATURES

ALTERNATIVES

A binary analysis platform for analyzing binary programs

Customizable live OS constructor tool for remote forensics and incident response.

A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.

A Python-based engine for automatic creation of timelines in digital forensic analysis

A tool for parsing and extracting information from the Master File Table of NTFS file systems.

A tool that uses Plaso to parse forensic artifacts and disk images, creating custom reports for easier analysis.

ForensicMiner, Redefine DFIR Automations

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved