// artifact family
mobile forensics
162 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.
tools in this family
ordered as in the forensics catalog. every tool runs locally — no upload, no account.
- apk analyzerdrop an android apk · permissions · activities · services · manifest · certificates · embedded urls · strings · no disassembly · runs locally
- ios ipa analyzerdrop an ios ipa · info.plist · entitlements · permissions · url schemes · embedded frameworks · certificate hints · runs locally
- android backup analyzerdrop an android backup ab file · browse app data · extract databases · files · shared preferences · runs locally
- ios backup analyzerdrop an ios backup manifest · browse file structure · extract app data · databases · runs locally
- android apk permissions auditordrop an .apk · parse AndroidManifest.xml · list all declared permissions · flag dangerous permissions · detect unusual API combinations · runs locally
- android sms database parserdrop Android mmssms.db · parse SMS and MMS threads · contacts · timestamps · export conversations as CSV · runs locally
- android call log parserdrop Android contacts2.db or calllog.db · parse incoming · outgoing · missed calls · contacts · duration · timestamps · export CSV · runs locally
- plist readerdrop an iOS or macOS .plist file · parse binary or XML format · tree view · export JSON · runs locally
- ios backup browserdrop an iTunes backup Manifest.db · list backed-up apps · files · domains · relative paths · export CSV · runs locally
- ios sms database parserdrop iOS backup SMS.db · threaded conversation view · timestamps · attachments · participants · export CSV · runs locally
- ios call history parserdrop ios callhistory storedata sqlite · parse all call records · reconstruct call timeline · identify frequent contacts unknown numbers and voip calls · surface deleted call gap analysis · runs locally
- android logcat analyzerdrop android logcat output · parse log levels · crash detection · anr · security exceptions · network activity · timeline · runs locally
- ios crash log analyzerdrop ios crash reports ips or crash files · exception type · stack trace · loaded images · thread states · runs locally
- mobile app sqlite forensicsdrop mobile app databases · sms idb whatsapp signal contacts · auto-detect schema · show messages contacts calls · runs locally
- macos launch agents & daemons parserdrop plist files from LaunchAgents or LaunchDaemons · parse program args · run-at-load · intervals · flag network callbacks · suspicious paths · export CSV · runs locally
- ios location historydrop ios location sqlite databases · zrtvisit zannotation learned poi · apple absolute time · timeline · movement ascii · export csv · runs locally
- dex inspectordrop .dex or .apk · string pool · classes methods imports · flag suspicious android APIs · csv · runs locally
- itunes backup decryptorManifest.plist + encrypted Manifest.db · KeyBag TLV · PBKDF2 AES-KW · Files table · domain filter · CSV · runs locally
- android sparse imagesparse .img 0xED26FF3A · RAW FILL DONT_CARE CRC32 · chunk map · ext4 f2fs detect · OTA warn · CSV · runs locally
- ios health database deep forensic analyzerdrop healthdb secure.sqlite · steps heart rate sleep falls workouts · movement timeline · alibi verification · runs locally
- ios photos database forensic analyzerdrop photos.sqlite · metadata including deleted · location · hidden photos · creation timeline · runs locally
- ios screen time forensic analyzerdrop screen time sqlite from ios backup · app usage · website visits · pickup frequency · digital activity · alibi assessment · runs locally
- ios notes complete forensic analyzerdrop notestore.sqlite · notes including deleted · locked metadata · attachments · sensitive content scan · runs locally
- android notification history forensic analyzerdrop notification db or log exports · reconstruct alerts · message previews · communication timeline · runs locally
- ios location history deep reconstructordrop ios backup databases · correlate significant locations · routined · coreduet · cache.sqlite · motion data · reconstruct complete movement history from all available ios location sources · runs locally
- mobile app sqlite schema auto-mapperdrop any unknown mobile app sqlite database · auto-detect schema · classify tables by content type · identify messages contacts locations media · extract data from recognized patterns · reverse-engineer unknown app databases · runs locally
- android ota and system image inspectordrop android ota zip files or system img files · parse sparse image format · extract partition table · browse installed app list · detect modifications from stock · extract build fingerprint · identify rooting indicators · runs locally
- android logcat forensic parserdrop android logcat txt or log · threadtime brief time auto-detect · crash selinux install security panels · runs locally
- android sqlite app database browserdrop android app sqlite db · schema discovery · table heuristics · credential column masking · runs locally
- ios backup manifest and status parserdrop manifest status or info plist · backupkeybag tlv · encryption assessment · installed apps · runs locally
- ios encrypted backup password recovery artifact detectordrop manifest.plist · keybag pbkdf2 salt and iterations · crack time estimates · protection class keys · runs locally
- ios backup manifest integrity verifierdrop manifest.db and backup blobs · sha1 integrity vs manifest · missing modified unexpected files · runs locally
- ios backup diff and version comparatordrop two manifest.db files · added deleted modified renamed paths · forensic significance tags · runs locally
- ios backup encryption key artifact analyzerdrop manifest.plist and manifest.db · keybag hierarchy · protection class accessibility · per-file encryption class counts · runs locally
- ios crash log forensic analyzerdrop ios crash log .ips or .crash file · parse structured crash report · extract exception type signal and faulting address · reconstruct crash context · surface forensically relevant crash patterns and repeated crashes · runs locally
- ios datausage sqlite parserdrop ios datausage sqlite · parse per-app cellular and wifi data usage statistics · reconstruct which apps consumed network data and when · surface large data transfers and unusual app network activity · runs locally
- ios keychain artifact parserdrop keychain-backup plist · metadata only · access groups · wifi and web credentials · no secret bytes · runs locally
- ios plist parser and analyzerdrop ios plist binary or xml · nested tree · forensic key detection · flattened csv export · runs locally
- ios pairing record forensic analyzerdrop itunes lockdown pairing plist · parse device and host certificates · escrow bag detection · pairing age and trust implications · csv json export · runs locally
- ios lockdown certificate artifact extractordrop pairing plist der or pem · decode x509 lockdown certs · chain validation · udid and host uuid · pem csv json export · runs locally
- sms and imessage database parserdrop ios sms.db sqlite file · parse all messages conversations and attachments · reconstruct conversation threads · surface deleted message gaps and attachment metadata · runs locally
- ios imessage attachment forensic extractordrop ios sms.db and attachment files from backup · parse attachment records · uti types · transfer state · cross-reference files on disk · expired audio · stickers · runs locally
- ios imessage deletion artifact detectordrop ios sms.db · rowid gaps · join orphans · deleted_messages tombstones · ck_sync_state=2 · two-db guid compare · bulk deletion · runs locally
- ios imessage unsend artifact detectordrop ios sms.db · detect imessage unsend artifacts · system messages · processing tasks · 2-minute window · runs locally
- ios imessage edited message forensic reconstructordrop ios sms.db · detect imessage edit artifacts · edit chain reconstruction · word diff between versions · two-db text delta · runs locally
- ios spotlight search artifact extractordrop ios spotlight sqlite or interactionc database · extract spotlight search queries · reconstruct what the user searched for on device · surface app launches via spotlight and searched contact names · runs locally
- itunes backup artifact extractordrop manifest db and backup plists · domain inventory · high-value paths · fileid mapping · runs locally
- iOS iTunes backup forensic analyzerdrop manifest db or plist · full backup inventory · device identity · keybag · domain breakdown · runs locally
- iOS backup source device identifierdrop info plist · extract udid imei serial · model lookup · multi-backup mismatch flags · runs locally
- iOS partial backup forensic reconstructordrop manifest db and status plist · reconstruct interrupted backup coverage · domain and app gaps · runs locally
- iOS device timestamp vs backup timestamp conflict detectordrop info plist and manifest db · detect future file timestamps · clock manipulation flags · runs locally
- mobile app sandbox artifact analyzerdrop ios app sandbox directory listing or android app data directory listing · identify forensically significant files within app sandboxes · map file types to forensic categories · surface databases caches preferences and logs within each app container · runs locally
- mobile device pairing record analyzerdrop ios lockdown pairing plist or android adb key files · parse device pairing credentials · identify which computers have been paired with the device · surface pairing timestamps and certificate details · runs locally
- mobile location history extractordrop ios locations sqlite · google location json · csv gps · haversine stops · movement timeline · runs locally
- mobile photo metadata batch analyzerdrop multiple jpeg or heic image files · extract and aggregate exif metadata · reconstruct photo timeline and location trail · surface device identifiers camera settings and gps coordinates across all images · runs locally
- mobile screen time parserdrop ios screen time sqlite or android usage_stats.db · daily usage · per-app ranking · hourly heatmap · runs locally
- ios afc (apple file conduit) artifact extractorpaste or drop afc log or filesystem listing · parse afc transfer artifacts · reconstruct access timeline · flag afc2 paths · runs locally
- ios checkm8 extraction artifact analyzerpaste or drop checkra1n or palera1n log · parse exploit chain · device chip ios version · forensic integrity rating · runs locally
- ios jailbreak artifact detectordrop manifest db or path list · detect jailbreak indicators cydia sileo substrate · tool identification · removal hints · runs locally
- ios jailbreak type and version identifierdrop path list or manifest db · identify jailbreak tool version type rootless rootful · bootstrap hooking framework · integrity assessment · runs locally
- ios agent-based extraction artifact parserdrop agent extraction manifest json xml plist · parse tool version data classes · team id lookup · consent and integrity notes · runs locally
- iOS DataUsage.sqlite forensic analyzerdrop an iOS DataUsage.sqlite file · parse cellular and WiFi data usage records per app · surface usage timelines, roaming events, and anomalous data transfers · correlate app data usage with device activity · reconstruct network activity timeline · runs locally
- iOS netusage artifact forensic extractordrop an iOS netusage.sqlite or network usage plist · parse per-process network usage records · surface WiFi and cellular transfer volumes · reconstruct network activity timeline per app · detect anomalous upload patterns · runs locally
- iOS powerlog forensic analyzerdrop an iOS powerlog database (CurrentPowerlog.PLSQL or exported powerlog text) · parse power state, app foreground/background transitions, CPU wake events, and network activity indicators · reconstruct device activity timeline from power events · runs locally
- iOS aggregated dict forensic extractordrop iOS aggregated usage plist files (from private/var/mobile/Library/AggregateDictionary/) · parse aggregated scalar and histogram counters · decode counter keys · surface usage frequency data for system features and app interactions · runs locally
- iOS biome artifact forensic analyzerdrop iOS BIOME stream files (from private/var/mobile/Library/Biome/streams/) · parse BIOME protobuf or binary format records · decode activity stream entries · surface app usage, user interactions, and behavioral patterns recorded by the BIOME framework · runs locally
- ios knowledge c database forensic analyzerdrop knowledgeC.db · parse ZOBJECT activity store · app sessions lock wifi location siri camera mic · full timeline · runs locally
- ios screen time artifact forensic extractordrop RMAdminStore or screen time db · app usage pickups notifications web · gaps bypass flags · runs locally
- ios app install and uninstall timeline reconstructordrop manifest db applicationstate plists installd log · install uninstall upgrade timeline · mass uninstall alerts · runs locally
- ios app usage duration forensic analyzerdrop knowledgeC RMAdminStore BIOME · multi-source session merge · per-app stats gaps discrepancies · runs locally
- ios spotlight forensic artifact extractordrop spotlight index stores or plist exports · parse search index artifacts · query history and app indexing records · detect anti-forensic index removal · runs locally
- ios core data artifact forensic parserdrop an ios core data sqlite store · parse entity model and records · decode timestamps and blob attributes · reconstruct schema for forensic interpretation · runs locally
- ios keychain artifact forensic extractordrop keychain-backup plist from itunes backup · parse item classes · decode accessibility and timestamps · surface credentials tokens certificates · runs locally
- ios wallet pass forensic artifact analyzerdrop apple wallet pkpass or wallet database · parse pass structure · extract barcode location beacons and travel dates · surface payment and identity pass data · runs locally
- ios health database forensic extractordrop healthdb secure sqlite · parse health records samples and metadata · step counts heart rate sleep workouts · reconstruct activity timeline · runs locally
- ios activity energy and motion artifact analyzerdrop ios health databases · parse energy exercise stand and move goal data · reconstruct activity ring history · correlate energy with device activity · runs locally
- iOS plist forensic parserdrop any iOS plist file (binary or XML) · parse all keys and values · decode NSDate timestamps to human-readable UTC · detect and decode nested binary plists · surface all forensically significant fields · runs locally
- iOS binary plist deep extractordrop a binary plist or any file containing embedded bplist blobs · deeply extract all nested binary plists · decode all NSDate timestamps · recover partial or truncated plist structures · surface all embedded data objects · runs locally
- iOS unified log (logarchive) forensic analyzerdrop an iOS unified log export (text, JSON, or CSV from log show) · parse log entries · filter by subsystem, category, process, and time range · surface security-relevant events · reconstruct activity timelines · runs locally
- iOS crash log forensic extractordrop an iOS crash log (.crash or .ips file) · parse crash report structure · extract faulting process, exception type, crashed thread backtrace, and binary images · identify forensically significant crashes · detect signs of exploitation or intentional crash induction · runs locally
- iOS sysdiagnose artifact analyzerdrop an iOS sysdiagnose archive (tar.gz or extracted folder listing) · enumerate all artifact categories present · parse high-value forensic files within the archive · surface device state, installed apps, active processes, network state, and log excerpts · runs locally
- iOS IPS crash report forensic parserdrop iOS .ips crash report files (JSON format, iOS 15+) · parse the full IPS structure · decode all fields · surface exception details, thread states, memory maps, and jetsam metadata · correlate multiple crash reports · runs locally
- iOS ktrace artifact forensic analyzerdrop an iOS ktrace file or kdebug log export · parse kernel trace events · surface syscall patterns, process activity, and I/O operations · detect anomalous kernel event sequences · reconstruct process and thread activity timelines · runs locally
- ios voicemail artifact forensic extractordrop voicemail.db · parse voicemail records · caller numbers timestamps durations · deleted tombstones · rowid gaps · runs locally
- ios recent calls database forensic analyzerdrop CallHistory.storedata · parse call records · caller callee type duration · deleted row gaps · call timeline · runs locally
- ios call history gap detectordrop CallHistory.storedata · detect pk gaps and temporal silence · two-db delta · voicemail cross-ref · runs locally
- ios contacts database forensic analyzerdrop AddressBook.sqlitedb · parse contacts phones emails notes · rowid gaps · account sources · runs locally
- ios contact merge and deletion artifact detectordrop AddressBook.sqlitedb · detect deleted merged modified contacts · orphaned multi-values · two-db delta · runs locally
- ios notes database forensic extractordrop NoteStore.sqlite · parse note content attachments · deleted trashed notes · nskeyedarchiver decode · runs locally
- ios locked note artifact analyzerdrop NoteStore.sqlite · surface password-protected notes · encryption header metadata · snippet fragments · runs locally
- ios reminders database forensic extractordrop RemindersV6.storedata · parse reminders lists due dates · completed trashed recurring · runs locally
- ios calendar event forensic analyzerdrop Calendar.sqlitedb · parse events calendars attendees · deleted cancelled meetings · runs locally
- ios maps search history forensic extractordrop Maps sqlite or plist · parse searches destinations · home work locations · route history · runs locally
- ios significant locations forensic extractordrop routined Cache.sqlite · parse significant places visits · home work inference · visit timeline · runs locally
- ios frequent locations artifact analyzerdrop routined cache · location clusters stay-points · commute patterns · anomaly detection · runs locally
- ios geofence artifact forensic extractordrop clients.plist · parse geofence regions · entry exit events · stalkerware heuristics · runs locally
- ios motion activity artifact forensic analyzerdrop CoreMotion sqlite · parse activity sessions · automotive walking timeline · daily summaries · runs locally
- ios workout route forensic extractordrop healthdb with workout routes · decode protobuf cllocation series · reconstruct gps paths · gpx and csv export · runs locally
- ios coremotion artifact forensic analyzerdrop coremotion sqlite · parse cmmotionactivity · motion timeline · automotive sessions · gap inventory · runs locally
- ios exif and photo metadata forensic extractordrop jpeg heic png · extract exif gps tags · timestamp discrepancy flags · metadata csv export · runs locally
- ios photos.sqlite forensic analyzerdrop photos.sqlite · zasset inventory · deleted hidden gps clusters · faces albums · timestomp flags · runs locally
- ios deleted photo recovery artifact detectordrop photos.sqlite · recently deleted tombstones · mass deletion events · cloud-only artifacts · runs locally
- ios shared album artifact forensic extractordrop photos.sqlite · shared album inventory · public url alerts · participant metadata · runs locally
- ios face recognition grouping forensic analyzerdrop photos.sqlite · zperson zdetectedface · co-occurrence matrix · person directory · runs locally
- ios screen recording artifact detectordrop photos.sqlite or path list · detect screen recordings · replaykit resolution match · deleted hidden alerts · runs locally
- ios screenshot burst forensic analyzerdrop photos.sqlite · screenshot detection · burst clustering · rapid capture flags · runs locally
- iOS WhatsApp artifact forensic extractordrop iOS WhatsApp ChatStorage.sqlite and Contacts.sqlite · parse all chats, messages, groups, and media references · reconstruct conversation timelines with delivery status · surface location shares, contact cards, and deleted message placeholders · runs locally
- iOS WhatsApp call log forensic analyzerdrop iOS WhatsApp ChatStorage.sqlite · parse WhatsApp voice and video call records from ZWACALLHISTORY or system message fallback · extract call type, duration, direction, and timestamps · detect missed and rejected calls · surface call patterns · runs locally
- iOS WhatsApp deleted message recovery detectordrop iOS WhatsApp ChatStorage.sqlite (one or two versions) · detect soft-deleted placeholders and hard-deleted ROWID gaps · surface media residue from deleted messages · detect bulk deletion patterns before acquisition · runs locally
- ios safari browsing history forensic analyzerdrop History.db · urls titles visit counts timestamps · tombstones rowid gaps · sessions search queries · runs locally
- ios safari icloud tab forensic extractordrop CloudTabs.db · synced open tabs across icloud devices · urls titles device names · cross-device overlap · runs locally
- ios safari download artifact forensic analyzerdrop Downloads.plist · source urls filenames sizes timestamps · partial auto-delete flags · suspicious types · runs locally
- ios safari favicon database forensic extractordrop Favicons.db · page urls and favicon timestamps · survives history clearing · optional History.db cross-ref · runs locally
- ios safari reading list artifact forensic extractordrop Bookmarks.db · reading list urls titles excerpts · fetch status offline copy · deleted row gaps · runs locally
- ios signal artifact forensic extractordrop signal.sqlite · parse conversations and messages · disappearing timers · view-once flags · draft messages · registered phone · rowid gaps · runs locally
- ios signal sealed sender artifact analyzerdrop signal.sqlite · three-timestamp delivery analysis · linked device activity · identity verification · burst detection · latency patterns · runs locally
- ios telegram artifact forensic extractordrop cache4.db or account db · parse chats messages channels · forwarding edits tombstones · disappearing timers · mid gap analysis · runs locally
- ios telegram secret chat artifact detectordrop telegram db · detect secret chat sessions · dh key fingerprint emoji grid · sequence gap analysis · self-destruct timers · runs locally
- ios instagram artifact forensic extractordrop iOS Instagram database files from the app container · parse direct messages, search history, and account artifacts · surface ephemeral media tombstones and cached CDN URLs · reconstruct Instagram activity timeline · runs locally
- ios snapchat artifact forensic extractordrop iOS Snapchat database files from the app container · parse snap metadata, chat records, and friend lists · surface snap open timestamps, screenshot alerts, and expired snap tombstones · reconstruct Snapchat activity timeline · runs locally
- ios snapchat memory forensic extractordrop iOS Snapchat database files · parse Snapchat Memories artifacts · extract saved snap metadata, camera roll save records, location tags, and Highlights · detect deleted Memories · surface cloud sync status · runs locally
- ios tiktok local artifact forensic extractordrop iOS TikTok database files from the app container · parse direct messages, search history, video view records, and account identity artifacts · surface content interaction patterns and communication metadata · reconstruct TikTok activity timeline · runs locally
- ios discord artifact forensic extractordrop iOS Discord database files from the app container · parse cached messages, server memberships, DM threads, and user identity · surface deleted message local cache content · decode Discord snowflake timestamps · reconstruct Discord communication timeline · runs locally
- ios facebook messenger artifact forensic extractordrop iOS Facebook Messenger database files from the app container · parse message threads, call records, and group memberships · surface message content, unsent message envelopes, and media references · reconstruct Messenger communication timeline · runs locally
- ios linkedin artifact forensic extractordrop iOS LinkedIn database files from the app container · parse messaging artifacts, connection metadata, job search history, and application records · surface professional identity and communication patterns · reconstruct LinkedIn activity timeline · runs locally
- ios twitter/x artifact forensic extractordrop iOS Twitter/X database files from the app container · parse direct messages, tweet cache, and search history · surface DM content including deleted message local cache · decode Twitter snowflake timestamps · reconstruct Twitter/X activity timeline · runs locally
- ios cash app artifact forensic extractordrop iOS Cash App database files from the app container · parse transaction records, payment notes, and account artifacts · surface payment amounts, counterparty Cashtags, and timestamps · detect suspicious payment patterns and structured transactions · runs locally
- ios venmo artifact forensic extractordrop iOS Venmo database files from the app container · parse payment records and transaction notes · surface audience settings (public/friends/private) · surface social feed likes and comments on transactions · reconstruct Venmo financial and social activity timeline · runs locally
- ios uber artifact forensic extractordrop iOS Uber database files from the app container · parse trip records and pickup/dropoff locations · surface saved Home and Work locations · detect airport trips, night trips, and surge pricing events · reconstruct travel history · runs locally
- ios lyft artifact forensic extractordrop iOS Lyft database files from the app container · parse ride records and pickup/dropoff locations · surface saved Home and Work locations · detect airport trips, night trips, and Primetime pricing events · reconstruct Lyft travel history · runs locally
- iOS Mail app artifact forensic extractordrop iOS Mail Envelope Index + Protected Index · parse envelope metadata · sender recipient subject snippet · mailbox threads accounts · runs locally
- iOS Mail deleted message recovery artifact detectordrop iOS Mail Envelope Index (1–2 versions) · Trash soft-delete · ROWID gaps · flags deleted · thread orphans · two-DB delta · runs locally
- ios dating app artifact forensic extractor (Tinder, Bumble, Hinge)drop iOS dating app database files (Tinder, Bumble, or Hinge) · auto-detect app · parse match records, messages, and profile metadata · surface match timestamps, screenshot alerts, and own location from account plist · detect confirmed real-world meetings (Hinge We Met) · runs locally
- ios gaming artifact forensic extractordrop iOS Game Center database files or StoreKit IAP cache · parse achievement records, leaderboard scores, multiplayer match history, and in-app purchase records · surface gaming activity timestamps and social gaming relationships · runs locally
- ios banking app artifact forensic extractordrop iOS banking app database files from the app container · parse cached transaction records, account summaries, and notification artifacts · surface transaction metadata, MCC-decoded merchant types, and fraud/login alerts · detect suspicious transaction patterns · runs locally
- ios vpn app artifact forensic extractordrop iOS VPN app database files, configuration plists, and NEVPNManager records · parse connection session logs, server configurations, and account artifacts · surface kill switch, obfuscation, multi-hop, and Tor settings · detect VPN usage gaps and anti-forensic patterns · runs locally
- ios burner app artifact detectordrop iOS backup Manifest.db, ApplicationState.db, knowledgeC.db, or app listings · detect installed and previously deleted burner phone number and anonymous communication apps · surface usage timestamps and residual artifacts from deleted apps · identify ephemeral identity patterns · runs locally
- ios encrypted messaging app residue detectordrop iOS backup Manifest.db, knowledgeC.db, Screen Time database, DataUsage.sqlite, and keychain files · detect and quantify encrypted messaging app usage across all artifact sources · reconstruct scope of inaccessible encrypted communications · produce forensic gap assessment · runs locally
- ios sms and imessage database forensic analyzerdrop sms.db · parse messages handles chats attachments · tapbacks reply threads rowid gaps · delivery read receipts timeline · runs locally
- iOS FaceTime call artifact forensic analyzerdrop iOS FaceTime call history databases (FaceTime.db or CallHistory.storedata) and relevant plists · parse FaceTime audio and video call records · extract caller/callee identities, call duration, call type, and timestamps · detect missed, declined, and failed calls · surface FaceTime Link artifacts · reconstruct FaceTime communication timeline · runs locally
- iOS AirDrop artifact forensic extractordrop iOS AirDrop database files and system logs · parse AirDrop transfer records · extract sender and receiver identities, filenames, transfer timestamps, and acceptance status · surface AirDrop discovery logs · detect unsolicited AirDrop attempts · reconstruct AirDrop file transfer history · runs locally
- iOS SharePlay artifact forensic analyzerdrop iOS SharePlay database files, FaceTime call history, and relevant plists · parse SharePlay session artifacts · surface shared media identifiers, activity types, and participant information · reconstruct SharePlay activity timeline and co-viewing/co-listening history · runs locally
- android adb backup forensic analyzerdrop an android adb backup file (.ab) · parse the backup header · decompress and extract the tar archive · enumerate all backed-up app packages, files, and databases · surface device metadata, backup flags, and encryption status · reconstruct the full backup manifest · runs locally
- android adb logcat forensic extractordrop an android logcat output file (text or binary) · parse all log entries · extract timestamps, pid, tid, log level, tag, and message · detect forensically significant events · surface app crashes, permission grants, package installs/uninstalls, and network events · reconstruct device activity timeline · runs locally
- android apk downgrade artifact detectordrop android apk files, logcat output, or package manager dump text · detect apk downgrade installation artifacts · identify version regression indicators · surface forensic tool signatures associated with downgrade-based extraction (oxygen, cellebrite, ufed) · assess whether downgrade was used for forensic data extraction · runs locally
- android full filesystem extraction artifact analyzerdrop an android filesystem extraction manifest or directory listing · parse the filesystem structure · enumerate partitions, key directories, and forensically significant files · surface extraction method artifacts · assess completeness of the extraction · identify files requiring further analysis · runs locally
- android edl artifact analyzerdrop edl extraction logs, qpst output files, or qualcomm emergency download metadata · parse edl session artifacts · identify programmer (firehose) version and capabilities · surface partition table from gpt artifacts · detect edl-based extraction tool signatures · assess forensic integrity of edl extraction · runs locally
- android mtk preloader artifact extractordrop mtk sp flash tool logs scatter files or nvram · parse brom extraction artifacts · imei mac identity · critical write alerts · runs locally
- android qualcomm sahara artifact forensic analyzerdrop qualcomm sahara edl logs or hex captures · parse handshake packets · msm chipset oem pk hash · command timeline csv · runs locally
- android chipset-specific extraction artifact analyzerdrop getprop bugreport or extraction logs · identify chipset family · extraction capability matrix · device model lookup · runs locally
- android rooting method artifact detectordrop filesystem listing getprop or logcat · detect magisk kernelsu supersu frida · root path database · confidence scoring · runs locally
- android root residue forensic analyzerdrop getprop filesystem listing or logcat · detect past rooting residue · knox bit bootloader unlock · magisk cleanup artifacts · runs locally
- android factory reset artifact detectordrop recovery logs logcat getprop or path listings · detect factory reset evidence · recovery wipe timeline · mdm remote wipe · boot count · runs locally
- android factory reset protection bypass artifact detectordrop frp partition logcat getprop or accounts data · detect frp bypass artifacts · identify bypass method · bootloader unlock · account setup forensics · runs locally
- android device encryption artifact analyzerdrop getprop fstab logcat or path listings · fbe vs fde detection · de vs ce accessibility matrix · metadata encryption · runs locally
- android file-based encryption artifact extractordrop fbe key blobs vold listings getprop or keystore files · parse key blob v1/v2 · secdiscardable alerts · de vs ce inventory · runs locally
- android full disk encryption artifact analyzerdrop fde crypto footer binary getprop or logcat · parse kdf scrypt parameters · keymaster binding · brute-force matrix · hashcat hints · runs locally
- sim card artifact forensic extractordrop SIM dumps, ATR logs, EF file exports, or SIM filesystem images · parse SIM identifiers, service tables, SMS storage, network configuration, and SIM metadata · reconstruct SIM-level evidence and carrier provisioning state · runs locally
- sim iccid and imsi forensic correlatorcorrelate ICCID, IMSI, MSISDN, and carrier identifiers across artifacts · detect reused SIMs, carrier migrations, cloned identifiers, and multi-device associations · runs locally
- sim phonebook artifact forensic extractorparse SIM ADN/FDN/LND phonebook entries and reconstruct SIM-resident contact evidence · runs locally
- sim last number dialed artifact extractorparse SIM LND records and reconstruct last dialed number history · runs locally
- sim sms artifact forensic extractorparse SIM-resident SMS storage and reconstruct stored SMS evidence · runs locally