{"id":13642460,"url":"https://github.com/ydkhatri/mac_apt","last_synced_at":"2026-01-16T21:00:41.393Z","repository":{"id":24693176,"uuid":"101311218","full_name":"ydkhatri/mac_apt","owner":"ydkhatri","description":"macOS (\u0026 ios) Artifact Parsing Tool","archived":false,"fork":false,"pushed_at":"2026-01-13T15:19:39.000Z","size":7899,"stargazers_count":970,"open_issues_count":8,"forks_count":119,"subscribers_count":43,"default_branch":"master","last_synced_at":"2026-01-13T18:11:17.422Z","etag":null,"topics":["dfir","forensics","macos"],"latest_commit_sha":null,"homepage":"https://swiftforensics.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ydkhatri.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGES.txt","contributing":null,"funding":null,"license":"LICENSE.txt","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":"AUTHORS.md","dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2017-08-24T15:37:33.000Z","updated_at":"2026-01-13T15:20:50.000Z","dependencies_parsed_at":"2023-12-19T14:28:25.799Z","dependency_job_id":"d9f691aa-4bbc-4ba2-99a7-9916e6c2ad52","html_url":"https://github.com/ydkhatri/mac_apt","commit_stats":null,"previous_names":[],"tags_count":37,"template":false,"template_full_name":null,"purl":"pkg:github/ydkhatri/mac_apt","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ydkhatri%2Fmac_apt","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ydkhatri%2Fmac_apt/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ydkhatri%2Fmac_apt/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ydkhatri%2Fmac_apt/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ydkhatri","download_url":"https://codeload.github.com/ydkhatri/mac_apt/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ydkhatri%2Fmac_apt/sbom","scorecard":{"id":1236905,"data":{"date":"2025-08-04","repo":{"name":"github.com/ydkhatri/mac_apt","commit":"1a31222e92f995972444f0997997d906aab4bccd"},"scorecard":{"version":"v5.2.1-28-gc1d103a9","commit":"c1d103a9bb9f635ec7260bf9aa0699466fa4be0e"},"score":1.4,"checks":[{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#packaging"}},{"name":"Dangerous-Workflow","score":-1,"reason":"no workflows found","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#dangerous-workflow"}},{"name":"Token-Permissions","score":-1,"reason":"No tokens found","details":null,"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#token-permissions"}},{"name":"Maintained","score":10,"reason":"30 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#maintained"}},{"name":"Code-Review","score":0,"reason":"Found 0/30 approved changesets -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#code-review"}},{"name":"Binary-Artifacts","score":0,"reason":"binaries present in source code","details":["Warn: binary detected: Libraries_For_Windows/32bit_py37/pyewf.pyd:1","Warn: binary detected: Libraries_For_Windows/32bit_py37/pytsk3.pyd:1","Warn: binary detected: Libraries_For_Windows/32bit_py37/pyvmdk.pyd:1","Warn: binary detected: Libraries_For_Windows/32bit_py38/pyewf.pyd:1","Warn: binary detected: Libraries_For_Windows/32bit_py38/pytsk3.pyd:1","Warn: binary detected: Libraries_For_Windows/32bit_py38/pyvmdk.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py37/pyewf.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py37/pytsk3.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py37/pyvmdk.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py38/pyewf.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py38/pytsk3.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py38/pyvmdk.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py39/pyewf.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py39/pytsk3.pyd:1","Warn: binary detected: Libraries_For_Windows/64bit_py39/pyvmdk.pyd:1"],"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#binary-artifacts"}},{"name":"SAST","score":0,"reason":"no SAST tool detected","details":["Warn: no pull requests merged into dev branch"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#sast"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#cii-best-practices"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#security-policy"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE.txt:0","Info: FSF or OSI recognized license: MIT License: LICENSE.txt:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#license"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#fuzzing"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'master'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#branch-protection"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v1.26.1 not signed: https://api.github.com/repos/ydkhatri/mac_apt/releases/235653201","Warn: release artifact v1.13.6 not signed: https://api.github.com/repos/ydkhatri/mac_apt/releases/216738039","Warn: release artifact v1.7.5-dev not signed: https://api.github.com/repos/ydkhatri/mac_apt/releases/155348163","Warn: release artifact v1.5.8-dev not signed: https://api.github.com/repos/ydkhatri/mac_apt/releases/108890804","Warn: release artifact v1.5.0-dev not signed: https://api.github.com/repos/ydkhatri/mac_apt/releases/69395591","Warn: release artifact v1.26.1 does not have provenance: https://api.github.com/repos/ydkhatri/mac_apt/releases/235653201","Warn: release artifact v1.13.6 does not have provenance: https://api.github.com/repos/ydkhatri/mac_apt/releases/216738039","Warn: release artifact v1.7.5-dev does not have provenance: https://api.github.com/repos/ydkhatri/mac_apt/releases/155348163","Warn: release artifact v1.5.8-dev does not have provenance: https://api.github.com/repos/ydkhatri/mac_apt/releases/108890804","Warn: release artifact v1.5.0-dev does not have provenance: https://api.github.com/repos/ydkhatri/mac_apt/releases/69395591"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#signed-releases"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating python:3.9 to python:3.9@sha256:754dbbaf5fe730bb2460efb3300293c62c222f74fbf8534ed23691c617c9609b","Warn: pipCommand not pinned by hash: Dockerfile:3","Warn: pipCommand not pinned by hash: Dockerfile:4","Warn: pipCommand not pinned by hash: Dockerfile:5","Warn: pipCommand not pinned by hash: macos_installer/mac_apt_Install_macOS.sh:117","Warn: pipCommand not pinned by hash: macos_installer/mac_apt_Install_macOS.sh:118","Info:   0 out of   1 containerImage dependencies pinned","Info:   0 out of   5 pipCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#pinned-dependencies"}},{"name":"Vulnerabilities","score":0,"reason":"65 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GHSA-3ww4-gg4f-jr7f","Warn: Project is vulnerable to: GHSA-9v9h-cgj8-h64p","Warn: Project is vulnerable to: PYSEC-2021-62 / GHSA-hggm-jpg3-v476","Warn: Project is vulnerable to: PYSEC-2017-8 / GHSA-q3cj-2r34-2cwc","Warn: Project is vulnerable to: GHSA-3c5c-7235-994j","Warn: Project is vulnerable to: GHSA-3f63-hfp8-52jq","Warn: Project is vulnerable to: PYSEC-2021-41 / GHSA-3wvg-mj6g-m9cv","Warn: Project is vulnerable to: PYSEC-2020-77 / GHSA-3xv8-3j54-hgrp","Warn: Project is vulnerable to: PYSEC-2020-80 / GHSA-43fq-w8qq-v88h","Warn: Project is vulnerable to: GHSA-44wm-f244-xhp3","Warn: Project is vulnerable to: GHSA-4fx9-vc88-q2xc","Warn: Project is vulnerable to: PYSEC-2021-35 / GHSA-57h3-9rgr-c24m","Warn: Project is vulnerable to: PYSEC-2020-172 / GHSA-5gm3-px64-rw72","Warn: Project is vulnerable to: PYSEC-2021-331 / GHSA-7534-mm45-c74v","Warn: Project is vulnerable to: PYSEC-2021-92 / GHSA-7r7m-5h27-29hp","Warn: Project is vulnerable to: PYSEC-2020-78 / GHSA-8843-m7mw-mxqm","Warn: Project is vulnerable to: PYSEC-2023-227 / GHSA-8ghj-p4vj-mr35","Warn: Project is vulnerable to: PYSEC-2014-87 / GHSA-8m9x-pxwq-j236","Warn: Project is vulnerable to: PYSEC-2022-10 / GHSA-8vj2-vxx3-667w","Warn: Project is vulnerable to: PYSEC-2021-36 / GHSA-8xjq-8fcg-g5hw","Warn: Project is vulnerable to: PYSEC-2016-6 / GHSA-8xjv-v9xq-m5h9","Warn: Project is vulnerable to: PYSEC-2021-42 / GHSA-95q3-8gr9-gm8w","Warn: Project is vulnerable to: PYSEC-2022-168 / GHSA-9j59-75qj-795w","Warn: Project is vulnerable to: PYSEC-2014-10 / GHSA-cfmr-38g9-f2h7","Warn: Project is vulnerable to: PYSEC-2020-76 / GHSA-cqhg-xjhh-p8hf","Warn: Project is vulnerable to: PYSEC-2021-40 / GHSA-f4w8-cv6p-x6r5","Warn: Project is vulnerable to: PYSEC-2021-69 / GHSA-f5g8-5qq7-938w","Warn: Project is vulnerable to: PYSEC-2021-139 / GHSA-g6rj-rv7j-xwp4","Warn: Project is vulnerable to: PYSEC-2015-16 / GHSA-h5rf-vgqx-wjv2","Warn: Project is vulnerable to: PYSEC-2016-5 / GHSA-hggx-3h72-49ww","Warn: Project is vulnerable to: PYSEC-2020-84 / GHSA-hj69-c76v-86wr","Warn: Project is vulnerable to: PYSEC-2016-7 / GHSA-hvr8-466p-75rh","Warn: Project is vulnerable to: PYSEC-2015-15 / GHSA-j6f7-g425-4gmx","Warn: Project is vulnerable to: GHSA-j7hp-h8jx-5ppr","Warn: Project is vulnerable to: PYSEC-2019-110 / GHSA-j7mj-748x-7p78","Warn: Project is vulnerable to: GHSA-jgpv-4h4c-xhw3","Warn: Project is vulnerable to: PYSEC-2022-42979 / GHSA-m2vv-5vj5-2hm7","Warn: Project is vulnerable to: PYSEC-2021-37 / GHSA-mvg9-xffr-p774","Warn: Project is vulnerable to: PYSEC-2020-83 / GHSA-p49h-hjvm-jg3h","Warn: Project is vulnerable to: PYSEC-2022-8 / GHSA-pw3c-h7wp-cvhx","Warn: Project is vulnerable to: PYSEC-2021-93 / GHSA-q5hq-fp76-qmrc","Warn: Project is vulnerable to: PYSEC-2020-82 / GHSA-r7rm-8j6h-r933","Warn: Project is vulnerable to: PYSEC-2014-23 / GHSA-r854-96gq-rfg3","Warn: Project is vulnerable to: PYSEC-2016-8 / GHSA-rwr3-c2q8-gm56","Warn: Project is vulnerable to: PYSEC-2020-81 / GHSA-vcqg-3p29-xw73","Warn: Project is vulnerable to: PYSEC-2020-79 / GHSA-vj42-xq3r-hr3r","Warn: Project is vulnerable to: PYSEC-2021-70 / GHSA-vqcj-wrf2-7v73","Warn: Project is vulnerable to: PYSEC-2016-9 / GHSA-w4vg-rf63-f3j3","Warn: Project is vulnerable to: PYSEC-2014-22 / GHSA-x895-2wrm-hvp7","Warn: Project is vulnerable to: PYSEC-2022-9 / GHSA-xrcv-f9gm-v42c","Warn: Project is vulnerable to: PYSEC-2021-137","Warn: Project is vulnerable to: PYSEC-2021-138","Warn: Project is vulnerable to: PYSEC-2021-317","Warn: Project is vulnerable to: PYSEC-2021-38","Warn: Project is vulnerable to: PYSEC-2021-39","Warn: Project is vulnerable to: PYSEC-2021-94","Warn: Project is vulnerable to: PYSEC-2023-175","Warn: Project is vulnerable to: PYSEC-2018-21 / GHSA-hgg3-g7gr-66r7","Warn: Project is vulnerable to: GHSA-j225-cvw7-qrx7","Warn: Project is vulnerable to: PYSEC-2021-142 / GHSA-8q59-q68h-6hv4","Warn: Project is vulnerable to: PYSEC-2018-49 / GHSA-rprw-h62v-c2w7","Warn: Project is vulnerable to: PYSEC-2013-22 / GHSA-27x4-j476-jp5f","Warn: Project is vulnerable to: PYSEC-2025-49 / GHSA-5rjg-fvgr-3xxf","Warn: Project is vulnerable to: GHSA-cx63-2mw6-8hw5","Warn: Project is vulnerable to: PYSEC-2022-43012 / GHSA-r9hx-vwmv-q579"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/c1d103a9bb9f635ec7260bf9aa0699466fa4be0e/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-09-03T14:27:47.241Z","repository_id":24693176,"created_at":"2025-09-03T14:27:47.241Z","updated_at":"2025-09-03T14:27:47.241Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28482471,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-16T11:59:17.896Z","status":"ssl_error","status_checked_at":"2026-01-16T11:55:55.838Z","response_time":107,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["dfir","forensics","macos"],"created_at":"2024-08-02T01:01:31.728Z","updated_at":"2026-01-16T21:00:41.300Z","avatar_url":"https://github.com/ydkhatri.png","language":"Python","readme":"# mac_apt - macOS (and iOS) Artifact Parsing Tool\n[![Latest version](https://img.shields.io/badge/version-v1.13.6-blue)](https://github.com/ydkhatri/mac_apt/releases/tag/v1.13.6)\n[![status](https://img.shields.io/badge/status-stable-green)]()\n\nmac_apt is a DFIR (Digital Forensics and Incident Response) tool to process Mac computer full disk images (**or _live_ machines**) and extract data/metadata useful for forensic investigation. It is a python based framework, which has plugins to process individual artifacts (such as Safari internet history, Network interfaces, Recently accessed files \u0026 volumes, ..)\n\nmac_apt now also includes **[ios_apt](https://swiftforensics.com/2020/12/introducing-iosapt-ios-artifact-parsing.html)**, for processing ios images.\n\n#### Requirements: Python 3.9 or above (64 bit)\n_Note: Tested upto Python 3.14 on Windows and macOS (ARM and x64)._\n#### Features\n* Cross platform (no dependency on pyobjc)\n* Works on E01, VMDK, AFF4, DD, split-DD, DMG (no compression), SPARSEIMAGE, Velociraptor collected files (VR) \u0026 mounted images\n* XLSX, CSV, TSV, JSONL, Sqlite outputs\n* Analyzed files/artifacts are exported for later review\n* zlib, lzvn, lzfse compressed files are supported!\n* Native HFS \u0026 APFS parser\n* Reads the Spotlight database\n\n#### Latest\n:heavy_check_mark: Can read Velociraptor created targeted collection zip \\(when created via [MacOS.Search.FileFinder](https://docs.velociraptor.app/artifact_references/pages/macos.search.filefinder/)\\)   \n:heavy_check_mark: Can read Axiom created targeted collection zip files  \n:heavy_check_mark: ios_apt can read GrayKey extracted file system  \n:heavy_check_mark: Can read [RECON](https://sumuri.com/software/recon-itr/), [FUJI](https://github.com/Lazza/Fuji) and [ASLA](https://github.com/giuseppetotaro/asla) created .sparseimage files  \n:heavy_check_mark: Support for macOS Big Sur Sealed volumes (11.0)  \n:heavy_check_mark: Introducing **ios_apt** for processing iOS/ipadOS images  \n:heavy_check_mark: FAST mode :hourglass_flowing_sand:  \n:heavy_check_mark: Encrypted :lock: APFS images can now be processed using password/recovery-key :key:  \n:heavy_check_mark: macOS Catalina (10.15+) separately mounted SYSTEM \u0026 DATA volumes now supported  \n:heavy_check_mark: AFF4 images (including Macquisition/DigitalCollector created) are supported  \n\nAvailable Plugins (artifacts parsed) | Description\n------------------ | ---------------\nAPPLIST | Reads apps \u0026 printers installed and/or available for each user from appList.dat\nARD | Reads ARD (Apple Remote Desktop) cached databases about app usage\nASL | Reads ASL (Apple System Log) from asl.log, asl.db and \".asl\" files\nAUTOSTART | Retrieves programs, daemons, services set to start at boot/login\nBASICINFO | Basic machine \u0026 OS configuration like SN, timezone, computer name, last logged in user, HFS info\nBLUETOOTH | Gets Bluetooth Artifacts\nCALLHISTORY | Reads call history database\nCFURLCACHE | Reads CFURL cache to URLs, requests and responses\nCHROMIUM | Read Chromium Browsers (Edge, Chrome, Opera,..) History, Top Sites, Downloads and Extension info\nCOOKIES | Reads .binarycookies, .cookies files and HSTS.plist for each user\nCRASHREPORTER | Reads crash reporter plists\nDOCKITEMS | Reads the Dock plist for every user\nDOCUMENTREVISIONS | Reads DocumentRevisions database\nDOMAINS | Active Directory Domain(s) that the mac is connected to\nFACETIME | Read available facetime call metadata  \nFILESHARING | Read shared folder info\nFIREFOX | Read internet history from Mozilla Firefox browser\nFSEVENTS | Reads file system event logs (from .fseventsd)\nICLOUD | Extract items stored in iCloud Drive\nIDEVICEBACKUPS | Reads and exports iPhone/iPad backup databases\nIDEVICEINFO | Reads and exports connected iDevice details\nIMESSAGE | Read iMessage chats\nINETACCOUNTS | Retrieve configured internet accounts (iCloud, Google, Linkedin, facebook..)\nINSTALLHISTORY | Software Installation History\nKEYCHAINS | Reads the System keychain and decrypts stored passwords\nLAUNCHPAD | Reads the launchpad database for every user  \nMSOFFICE | Reads Word, Excel, Powerpoint and other office MRU/accessed file paths\nMSRDC | Reads connection history from Microsoft Remote Desktop database and extracts thumbnails\nNETUSAGE | Read network usage data statistics per application\nNETWORKING | Interfaces, last IP address, MAC address, DHCP ..\nNOTES | Reads notes databases\nNOTIFICATIONS | Reads mac notification data for each user\nPRINTJOBS | Parses CUPS spooled print jobs to get information about files/commands sent to a printer\nQUARANTINE | Reads the quarantine database and .LastGKReject file\nQUICKLOOK | Reads the QuickLook index.sqlite and carves thumbnails from thumbnails.data\nRECENTITEMS | Recently accessed Servers, Documents, Hosts, Volumes \u0026 Applications from .plist and .sfl files. Also gets recent searches and places for each user\nSAFARI | Internet history, downloaded file information, cookies and more from Safari caches\nSAVEDSTATE | Gets window titles from Saved Application State info\nSCREENSHARING | Reads the list of connected hosts with Screen Sharing\nSCREENTIME | Reads ScreenTime database for program and app usage\nSPOTLIGHT | Reads the spotlight index databases\nSPOTLIGHTSHORTCUTS | User typed data in the spotlight bar \u0026 targeted document/app\nSUDOLASTRUN | Gets last time sudo was used and a few other times earlier (if available)\nTCC | Reads Transparency, Consent and Control (TCC) database\nTERMINALSTATE | Reads Terminal saved state files which includes full text content of terminal windows\nTERMSESSIONS | Reads Terminal (bash \u0026 zsh) history \u0026 sesions for every user\n~~UNIFIEDLOGS~~ | ~~Reads macOS unified logging logs from .tracev3 files~~ _REMOVED as better options are [available](https://github.com/ydkhatri/UnifiedLogReader/blob/master/README.md#this-tool-is-now-archived-i-havent-had-time-to-update-this-tool-so-its-a-bit-outdated-there-isnt-incentive-to-update-this-any-more-as-python-processing-of-unifiedlogs-is-slow-and-takes-a-very-long-time-a-much-faster-rust-based-alternative-exists-please-use-that-instead-httpsgithubcommandiantmacos-unifiedlogs)_\nUNIFIEDLOGEXPORT | Exports Unifiedlogs and associated files for external processing  \nUSERS | Local \u0026 Domain user information - name, UID, UUID, GID, account creation \u0026 password set dates, pass hints, homedir \u0026 Darwin paths\nUTMPX | Reads utmpx file\nWIFI | Gets wifi network information\nWIFI_INTELLIGENCE | Gets Wifi connect/disconnect information from Apple Intelligence db\nXPROTECT | Reads XProtect diagnostic files and XProtect Behavior Service database\n\n### Coming soon..\n* Plugins for BIOME and KnowledgeC\n* More documentation\n\nFor installation (to run from code) see https://github.com/ydkhatri/mac_apt/wiki/Installation-for-Python3  \n**Please read the documentation here:** https://github.com/ydkhatri/mac_apt/wiki\n\nTo download windows binaries, proceed here - https://github.com/ydkhatri/mac_apt/releases\n\n## Bugs\nFeel free to send comments and feedback to yogesh@swiftforensics.com, or open an [issue](https://github.com/ydkhatri/mac_apt/issues).  \n\n[![Tweet](https://img.shields.io/twitter/url?style=social\u0026url=https%3A%2F%2Ftwitter.com%2Fswiftforensics)](https://twitter.com/swiftforensics)\n","funding_links":[],"categories":["Tools","IR Tools Collection","macOS Security","Python (144)","Challenges","Python","Other Lists","IR tools Collection","Forensics"],"sub_categories":["OS X Forensics","OSX Evidence Collection","🛡️ DFIR:","Acquisition and Evidence Collection"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fydkhatri%2Fmac_apt","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fydkhatri%2Fmac_apt","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fydkhatri%2Fmac_apt/lists"}