iOS Frequent Locations Dumper Logo

iOS Frequent Locations Dumper

0
Free
Visit Website

Dump the contents of the StateModel#.archive files located in /private/var/mobile/Library/Caches/com.apple.routined/ Usage: python dump_freq_locs.py -output {k, c, e} <StateModel#.archive> Output Options: k - KML c - CSV e - Everything (KML & CSV) Dependencies: hexdump.py: https://pypi.python.org/pypi/hexdump ccl_bplist.py: https://github.com/cclgroupltd/ccl-bplist Sample Output: sample_dump_freq_locs.txt - Sample script output Related Information: http://www.mac4n6.com/blog/2015/12/20/parsing-the-ios-frequent-locations

FEATURES

ALTERNATIVES

Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.

Fridump is an open source memory dumping tool using the Frida framework for dumping memory addresses from various platforms.

Collects and organizes Linux OS data for detailed analysis and incident response.

A powerful OSINT tool for creating custom templates for data extraction and analysis

Remote Acquisition Tool

A Kernel fuzzer focusing on race bugs

Customizable live OS constructor tool for remote forensics and incident response.

mXtract is a Linux-based tool for memory analysis and dumping with regex pattern search capabilities.