iOSForensic Logo

iOSForensic

0
Free
Visit Website

iOSForensic is a Python tool designed for forensic analysis on iOS devices. It can retrieve files, logs, extract SQLite3 databases, and uncompress .plist files into XML format. To install, clone the Git repository and install dependencies including Linux OpenSSH, sshpass, sqlite3, and Python >= 2.6. The tool requires a jailbroken iOS device with OpenSSH and syslogd installed, and Wi-Fi or USB connection. Various options are available for usage, such as displaying help messages, verbose mode, specifying IP address, port, and root password. Developed by Florian Pradines (Phonesec), iOSForensic is a recognized OWASP iOS security project since June 2014.

FEATURES

ALTERNATIVES

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.

Review of various MFT parsers used in digital forensics for analyzing NTFS file systems.

A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.

IE10Analyzer can parse and recover records from WebCacheV01.dat, providing detailed information and conversion capabilities.

Create checkpoint snapshots of the state of running pods for later off-line analysis.

Developing APIs to access memory on industrial control system devices.

PINNED