iOSForensic is a Python tool designed for forensic analysis on iOS devices. It can retrieve files, logs, extract SQLite3 databases, and uncompress .plist files into XML format. To install, clone the Git repository and install dependencies including Linux OpenSSH, sshpass, sqlite3, and Python >= 2.6. The tool requires a jailbroken iOS device with OpenSSH and syslogd installed, and Wi-Fi or USB connection. Various options are available for usage, such as displaying help messages, verbose mode, specifying IP address, port, and root password. Developed by Florian Pradines (Phonesec), iOSForensic is a recognized OWASP iOS security project since June 2014.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A powerful OSINT tool for creating custom templates for data extraction and analysis
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
Comprehensive suite for advanced file analysis and software supply chain security.
A shell script for basic forensic collection of various artefacts from UNIX systems.
Automated Mac Forensic Triage Collector
A reconnaissance tool for GitHub organizations