iOSForensic Logo

iOSForensic

0
Free
Visit Website

iOSForensic is a Python tool designed for forensic analysis on iOS devices. It can retrieve files, logs, extract SQLite3 databases, and uncompress .plist files into XML format. To install, clone the Git repository and install dependencies including Linux OpenSSH, sshpass, sqlite3, and Python >= 2.6. The tool requires a jailbroken iOS device with OpenSSH and syslogd installed, and Wi-Fi or USB connection. Various options are available for usage, such as displaying help messages, verbose mode, specifying IP address, port, and root password. Developed by Florian Pradines (Phonesec), iOSForensic is a recognized OWASP iOS security project since June 2014.

FEATURES

ALTERNATIVES

LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.

A console program for file recovery through data carving.

wxHexEditor is a free hex editor / disk editor with various data manipulation operations and visualization functionalities.

A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.

An anti-forensic Linux Kernel Module kill-switch for USB ports.

A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.

Automated tool for parsing Windows registry hives and extracting valuable information for forensic analysis.

Forensics tool for exploring offline Docker filesystems.