iOS Frequent Locations Dumper Logo

iOS Frequent Locations Dumper

0
Free
Updated 11 March 2025
Visit Website

Dump the contents of the StateModel#.archive files located in /private/var/mobile/Library/Caches/com.apple.routined/ Usage: python dump_freq_locs.py -output {k, c, e} <StateModel#.archive> Output Options: k - KML c - CSV e - Everything (KML & CSV) Dependencies: hexdump.py: https://pypi.python.org/pypi/hexdump ccl_bplist.py: https://github.com/cclgroupltd/ccl-bplist Sample Output: sample_dump_freq_locs.txt - Sample script output Related Information: http://www.mac4n6.com/blog/2015/12/20/parsing-the-ios-frequent-locations

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

usbdeath is an anti-forensic tool that manipulates udev rules for known USB devices and performs actions on unknown USB device insertion or specific USB device removal.

A network forensics tool for visualizing packet captures as network diagrams with detailed analysis.

Documentation project for Digital Forensics Artifact Repository

Open source tool for generating YARA rules about installed software from a running OS.

ForensicMiner, Redefine DFIR Automations

A library for working with Windows NT data types, providing access and manipulation functions.

Python tool for remote memory acquisition

An open source digital forensic tool for processing and analyzing digital evidence with high performance and multiplatform support.

Tool for parsing Android logs events and protobuf data

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved