mac_apt - macOS (and iOS) Artifact Parsing Tool

February 11, 2026 ยท View on GitHub

Latest version status

mac_apt is a DFIR (Digital Forensics and Incident Response) tool to process Mac computer full disk images (or live machines) and extract data/metadata useful for forensic investigation. It is a python based framework, which has plugins to process individual artifacts (such as Safari internet history, Network interfaces, Recently accessed files & volumes, ..)

mac_apt now also includes ios_apt, for processing ios images.

Requirements: Python 3.9 or above (64 bit)

Note: Tested upto Python 3.14 on Windows and macOS (ARM and x64).

Features

  • Cross platform (no dependency on pyobjc)
  • Works on E01, VMDK, AFF4, DD, split-DD, DMG (no compression), SPARSEIMAGE, UAC collections, Velociraptor collected files (VR) & mounted images
  • XLSX, CSV, TSV, JSONL, Sqlite outputs
  • Analyzed files/artifacts are exported for later review
  • zlib, lzvn, lzfse compressed files are supported!
  • Native HFS & APFS parser
  • Reads the Spotlight database

Latest

:heavy_check_mark: Can read Velociraptor created targeted collection zip (when created via MacOS.Search.FileFinder)
:heavy_check_mark: Can read Axiom created targeted collection zip files
:heavy_check_mark: ios_apt can read GrayKey extracted file system
:heavy_check_mark: Can read RECON, FUJI and ASLA created .sparseimage files
:heavy_check_mark: Can read UAC collections (ZIP, TAR, TAR.GZ) files
:heavy_check_mark: Support for macOS Big Sur Sealed volumes (11.0)
:heavy_check_mark: Introducing ios_apt for processing iOS/ipadOS images
:heavy_check_mark: FAST mode :hourglass_flowing_sand:
:heavy_check_mark: Encrypted :lock: APFS images can now be processed using password/recovery-key :key:
:heavy_check_mark: macOS Catalina (10.15+) separately mounted SYSTEM & DATA volumes now supported
:heavy_check_mark: AFF4 images (including Macquisition/DigitalCollector created) are supported

Available Plugins (artifacts parsed)Description
APPLISTReads apps & printers installed and/or available for each user from appList.dat
ARDReads ARD (Apple Remote Desktop) cached databases about app usage
ASLReads ASL (Apple System Log) from asl.log, asl.db and ".asl" files
AUTOSTARTRetrieves programs, daemons, services set to start at boot/login
BASICINFOBasic machine & OS configuration like SN, timezone, computer name, last logged in user, HFS info
BLUETOOTHGets Bluetooth Artifacts
CALLHISTORYReads call history database
CFURLCACHEReads CFURL cache to URLs, requests and responses
CHROMIUMRead Chromium Browsers (Edge, Chrome, Opera,..) History, Top Sites, Downloads and Extension info
COOKIESReads .binarycookies, .cookies files and HSTS.plist for each user
CRASHREPORTERReads crash reporter plists
DOCKITEMSReads the Dock plist for every user
DOCUMENTREVISIONSReads DocumentRevisions database
DOMAINSActive Directory Domain(s) that the mac is connected to
FACETIMERead available facetime call metadata
FILESHARINGRead shared folder info
FIREFOXRead internet history from Mozilla Firefox browser
FSEVENTSReads file system event logs (from .fseventsd)
ICLOUDExtract items stored in iCloud Drive
IDEVICEBACKUPSReads and exports iPhone/iPad backup databases
IDEVICEINFOReads and exports connected iDevice details
IMESSAGERead iMessage chats
INETACCOUNTSRetrieve configured internet accounts (iCloud, Google, Linkedin, facebook..)
INSTALLHISTORYSoftware Installation History
KEYCHAINSReads the System keychain and decrypts stored passwords
LAUNCHPADReads the launchpad database for every user
MSOFFICEReads Word, Excel, Powerpoint and other office MRU/accessed file paths
MSRDCReads connection history from Microsoft Remote Desktop database and extracts thumbnails
NETUSAGERead network usage data statistics per application
NETWORKINGInterfaces, last IP address, MAC address, DHCP ..
NOTESReads notes databases
NOTIFICATIONSReads mac notification data for each user
PRINTJOBSParses CUPS spooled print jobs to get information about files/commands sent to a printer
QUARANTINEReads the quarantine database and .LastGKReject file
QUICKLOOKReads the QuickLook index.sqlite and carves thumbnails from thumbnails.data
RECENTITEMSRecently accessed Servers, Documents, Hosts, Volumes & Applications from .plist and .sfl files. Also gets recent searches and places for each user
SAFARIInternet history, downloaded file information, cookies and more from Safari caches
SAVEDSTATEGets window titles from Saved Application State info
SCREENSHARINGReads the list of connected hosts with Screen Sharing
SCREENTIMEReads ScreenTime database for program and app usage
SPOTLIGHTReads the spotlight index databases
SPOTLIGHTSHORTCUTSUser typed data in the spotlight bar & targeted document/app
SUDOLASTRUNGets last time sudo was used and a few other times earlier (if available)
TCCReads Transparency, Consent and Control (TCC) database
TERMINALSTATEReads Terminal saved state files which includes full text content of terminal windows
TERMSESSIONSReads Terminal (bash & zsh) history & sesions for every user
UNIFIEDLOGSReads macOS unified logging logs from .tracev3 files REMOVED as better options are available
UNIFIEDLOGEXPORTExports Unifiedlogs and associated files for external processing
USERSLocal & Domain user information - name, UID, UUID, GID, account creation & password set dates, pass hints, homedir & Darwin paths
UTMPXReads utmpx file
WIFIGets wifi network information
WIFI_INTELLIGENCEGets Wifi connect/disconnect information from Apple Intelligence db
XPROTECTReads XProtect diagnostic files and XProtect Behavior Service database

Coming soon..

  • Plugins for BIOME and KnowledgeC
  • More documentation

For installation (to run from code) see https://github.com/ydkhatri/mac_apt/wiki/Installation-for-Python3
Please read the documentation here: https://github.com/ydkhatri/mac_apt/wiki

To download windows binaries, proceed here - https://github.com/ydkhatri/mac_apt/releases

Bugs

Feel free to send comments and feedback to yogesh@swiftforensics.com, or open an issue.

Tweet