Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human-friendly format. Dependencies: hexdump.py, ccl_bplist.py, mac_alias. Related Information: https://www.mac4n6.com/blog/2016/7/10/new-script-macmru-most-recently-used-plist-parser
Common questions about macMRU-Parser including features, pricing, alternatives, and user reviews.
macMRU-Parser is Python script to parse macOS MRU plist files into human-friendly format. It is a Security Operations solution designed to help security teams with Mac Os.
macMRU-Parser is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/mac4n6/macMRU-Parser/ for download and installation instructions.
Popular alternatives to macMRU-Parser include:
Compare all macMRU-Parser alternatives at https://cybersectools.com/alternatives/macmru-parser
macMRU-Parser is for security teams and organizations that need Mac Os. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.