Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      OS X Auditor

      Recommended Posts

      OS X Auditor is a free Mac OS X computer forensics tool.


      OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze:


      - the kernel extensions

      - the system agents and daemons

      - the third party's agents and daemons

      - the old and deprecated system and third party's startup items

      - the users' agents

      - the users' downloaded files

      - the installed applications


      It extracts:


      - the users' quarantined files

      - the users' Safari history, downloads, topsites, LastSession, HTML5 databases and localstore

      - the users' Firefox cookies, downloads, formhistory, permissions, places and signons

      - the users' Chrome history and archives history, cookies, login data, top sites, web data, HTML5 databases and local storage

      - the users' social and email accounts

      - the WiFi access points the audited system has been connected to (and tries to geolocate them)


      It also looks for suspicious keywords in the .plist themselves.


      It can verify the reputation of each file on:


      - Team Cymru's MHR

      - VirusTotal

      - Malware.lu

      - your own local database


      It can aggregate all logs from the following directories into a zipball:


      - /var/log (-> /private/var/log)

      - /Library/logs

      - the user's ~/Library/logs


      Finally, the results can be:


      - rendered as a simple txt log file (so you can cat-pipe-grep in them… or just grep)

      - rendered as a HTML log file

      - sent to a Syslog server


      Hidden Content

        Give reaction to this post to see the hidden content.


      Author : Jean-Philippe Teissier - @Jipe


      Download :

      Hidden Content

        Give reaction to this post to see the hidden content.


      Salutation LeVeL-23.Cc

      Edited by bxlcity
      add image

      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this