HunterM is a digital forensics tool designed to collect and analyze key macOS forensic artifacts. It is useful for incident response, threat hunting, and compromise assessments.
- β Collects Login Items, Network Connections, Extended Zsh History
- β Retrieves System Information (OS, kernel, timezone)
- β Extracts Browser History (Safari, Chrome, Firefox)
- β Lists Installed Applications
- β Exports collected artifacts into structured reports
- β
No dependencies (except
coloramafor colored output)
| Artifact | Description |
|---|---|
| Login Items | Applications that start automatically at login |
| Network Connections | Active network connections (ESTABLISHED state) |
| Zsh History | Extended shell history with timestamps |
| System Information | OS version, kernel details, timezone |
| Browser History | Safari, Chrome, and Firefox visited sites |
| Installed Applications | Lists all installed applications |
Python HunterM.py -e output_directory
