OWASP iOSForensic is a python tool to help in forensics analysis on iOS.
It get files, logs, extract sqlite3 databases and uncompress .plist files in xml.
OWASP iOSForensic is free to use. It is licensed under the GNU GPL v3 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
What is iOSForensic?
OWASP iOSForensic provides:
- Application's files
- Conversion of .plist files in XML
- Extract all databases
- Conversion of binary cookies
- Application's logs
- A List of all packages
- Extraction multiple packages
| valign="top" style="padding-left:25px;width:200px;" |
News and Events
May 2014 : Initial Release
iOSForensic is developed by a worldwide team of volunteers. The primary contributors to date have been:
As of May, 2014 the priorities are: The first release will be available May 30, 2014. After, I consider add options when it will be necessary. For example, if a new iOS firmware out, I will study if my programm need modifications. Also, if I find a new usefull options to add in my project, I will add it at fast as possible
Involvement in the development and promotion of iOSForenisc is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- Provide new functionalities
- Make changes in source code
- Make suggestions
| PROJECT INFO
What does this OWASP project offer you?
| RELEASE(S) INFO|
What releases are available for this project?