Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human-friendly format. Dependencies: hexdump.py, ccl_bplist.py, mac_alias. Related Information: https://www.mac4n6.com/blog/2016/7/10/new-script-macmru-most-recently-used-plist-parser
FEATURES
SIMILAR TOOLS
A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.
A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.