iOSForensic Logo

iOSForensic

0
Free
Visit Website

iOSForensic is a Python tool designed for forensic analysis on iOS devices. It can retrieve files, logs, extract SQLite3 databases, and uncompress .plist files into XML format. To install, clone the Git repository and install dependencies including Linux OpenSSH, sshpass, sqlite3, and Python >= 2.6. The tool requires a jailbroken iOS device with OpenSSH and syslogd installed, and Wi-Fi or USB connection. Various options are available for usage, such as displaying help messages, verbose mode, specifying IP address, port, and root password. Developed by Florian Pradines (Phonesec), iOSForensic is a recognized OWASP iOS security project since June 2014.

FEATURES

ALTERNATIVES

Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.

A library to access and parse Windows NT Registry File (REGF) format.

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.

NBD is a userland implementation of the Network Block Device protocol, allowing for remote access to block devices over a network.

A utility for recovering deleted files from ext3 or ext4 partitions.

A Python tool for in-depth PDF analysis and modification.

A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.

A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.