A free Mac OS X computer forensics tool that parses system artifacts, extracts user data, and verifies file reputation.
OS X Auditor is a forensic analysis tool for Mac OS X that parses system artifacts, extracts user data from browsers and applications, and checks file reputations against security services. It helps investigators collect evidence from live systems or disk images by analyzing a comprehensive set of forensic artifacts.
Digital forensic analysts, incident responders, and security researchers investigating Mac OS X systems for security incidents or compliance audits.
It provides a free, scriptable tool specifically for Mac forensics with extensive artifact coverage, multiple output formats, and integration with threat intelligence services like VirusTotal.
OS X Auditor is a free Mac OS X computer forensics tool
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Parses a wide range of system and user artifacts, including kernel extensions, browser histories (Safari, Firefox, Chrome), and installed applications, as detailed in the README's artifact list.
Generates results as plain text logs, HTML reports, or sends them to a Syslog server, enabling adaptable workflows for forensic analysts.
Verifies file reputations against VirusTotal and Team Cymru's MHR, aiding in malware detection during investigations.
Identifies connected Wi-Fi access points and attempts geolocation, useful for tracking system movement and context in forensic cases.
The README explicitly states it is no longer maintained and recommends switching to osxcollector, meaning no bug fixes, updates, or support for new macOS versions.
Only works with Python 2.7.2 to 2.7.9, not supporting modern Python 3.x, which limits integration with current tools and environments.
Must be run as root to access all system files, which can pose security risks and may not be feasible in locked-down or remote investigation scenarios.