iOSForensic Logo

iOSForensic

0
Free
Visit Website

iOSForensic is a Python tool designed for forensic analysis on iOS devices. It can retrieve files, logs, extract SQLite3 databases, and uncompress .plist files into XML format. To install, clone the Git repository and install dependencies including Linux OpenSSH, sshpass, sqlite3, and Python >= 2.6. The tool requires a jailbroken iOS device with OpenSSH and syslogd installed, and Wi-Fi or USB connection. Various options are available for usage, such as displaying help messages, verbose mode, specifying IP address, port, and root password. Developed by Florian Pradines (Phonesec), iOSForensic is a recognized OWASP iOS security project since June 2014.

FEATURES

ALTERNATIVES

A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.

A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.

NBD is a userland implementation of the Network Block Device protocol, allowing for remote access to block devices over a network.

A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys.

A library to access the Extensible Storage Engine (ESE) Database File (EDB) format used in various Windows applications.

Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.

A powerful tool for analyzing and visualizing system activity timelines.