{"id":17790,"date":"2021-09-16T13:39:52","date_gmt":"2021-09-16T13:39:52","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=17790"},"modified":"2021-09-16T13:39:55","modified_gmt":"2021-09-16T13:39:55","slug":"meat","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/meat\/","title":{"rendered":"MEAT : This Toolkit Aims To Help Forensicators Perform Different Kinds Of Acquisitions On iOS Devices"},"content":{"rendered":"\n<p><strong>MEAT<\/strong> aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/jfarley248\/MEAT#requirements-to-run-from-source\"><\/a><strong>Requirements to run from source<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows or Linux<\/li><li>Python 3.7.4 or 3.7.2<\/li><li>Pip packages seen in requirements.txt<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/jfarley248\/MEAT#types-of-acquisitions-supported\"><\/a><strong>Types of Acquisitions Supported<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/jfarley248\/MEAT#ios-devices\"><\/a><strong>iOS Devices<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/jfarley248\/MEAT#logical\"><\/a><strong>Logical<\/strong><\/p>\n\n\n\n<p>Using the logical acquisition flag on MEAT will instruct the tool to extract files and folders accessible through AFC on jailed devices. The specific folder that allows access is: \\private\\var\\mobile\\Media, which includes fodlers such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>AirFair<\/li><li>Books<\/li><li>DCIM<\/li><li>Downloads<\/li><li>general_storage<\/li><li>iTunes_Control<\/li><li>MediaAnalysis<\/li><li>PhotoData<\/li><li>Photos<\/li><li>PublicStaging<\/li><li>Purchases<\/li><li>Recordings<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/jfarley248\/MEAT#filesystem\"><\/a><strong>Filesystem<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/jfarley248\/MEAT#ios-device-prerequisites\"><\/a><strong>iOS Device Prerequisites<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Jailbroken iOS Device<\/li><li>AFC2 Installed via Cydia<\/li><\/ul>\n\n\n\n<p>Using the filesystem acquisition flag on MEAT will instruct the tool to start the AFC2 service and copy all files and fodlers back to the host machine.<\/p>\n\n\n\n<p>This method requires the device to be jailbroken with the following package installed:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apple File Conduit 2<\/li><\/ul>\n\n\n\n<p>This method can also be changed by the user using the -filesystemPath flag to instruct MEAT to only extract up a specified folder, useful if you&#8217;re doing app analysis and only want the app data.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/jfarley248\/MEAT#meat-help\"><\/a><strong>MEAT Help<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">usag<strong>e: MEAT.py [-h] [-iOS] [-filesystem] [-filesystemPath FILESYSTEMPATH]<br>[-logical] [-md5] [-sha1] -o OUTPUTDIR [-v]<br>MEAT &#8211; Mobile Evidence Acquisition Toolkit<br>optional arguments:<br>-h, &#8211;help show this help message and exit<br>-iOS Perform Acquisition on iOS Device<br>-filesystem Perform Filesystem Acquisition &#8211;<br>-filesystemPath FILESYSTEMPATH<br>Path on target device to acquire. Only use with &#8211;filesystem argument<br>Default will be &#8220;\/&#8221;<br>-logical Perform Logical Acquisition<br>iOS &#8211; Uses AFC to gain access to jailed content<br>-md5 Hash pulled files with the MD5 Algorithm. Outputs to Hash_Table.csv<br>-sha1 Hash pulled files with the SHA-1 Algorithm. Outputs to Hash_Table.csv<br>-o OUTPUTDIR Directory to store results<br>-v increase output verbosity<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Devices tested on<\/strong><\/p>\n\n\n\n<p>iPhone X iOS 13.3 iPhone XS iOS 12.4<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/jfarley248\/MEAT\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future). Requirements to run from source Windows or Linux Python 3.7.4 or 3.7.2 Pip packages seen in requirements.txt Types of Acquisitions Supported iOS Devices Logical Using the logical acquisition flag on MEAT will instruct the tool to extract [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":17797,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4077,4076,4078,4075],"class_list":["post-17790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-acquisitions","tag-forensicators","tag-ios-devices","tag-meat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MEAT : This Toolkit Aims To Help Forensicators Perform Acquisitions<\/title>\n<meta name=\"description\" content=\"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/meat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MEAT : This Toolkit Aims To Help Forensicators Perform Acquisitions\" \/>\n<meta property=\"og:description\" content=\"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/meat\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-16T13:39:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-16T13:39:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"MEAT : This Toolkit Aims To Help Forensicators Perform Different Kinds Of Acquisitions On iOS Devices\",\"datePublished\":\"2021-09-16T13:39:52+00:00\",\"dateModified\":\"2021-09-16T13:39:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/\"},\"wordCount\":306,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png\",\"keywords\":[\"Acquisitions\",\"Forensicators\",\"iOS Devices\",\"MEAT\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/meat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/meat\/\",\"name\":\"MEAT : This Toolkit Aims To Help Forensicators Perform Acquisitions\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png\",\"datePublished\":\"2021-09-16T13:39:52+00:00\",\"dateModified\":\"2021-09-16T13:39:55+00:00\",\"description\":\"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/meat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MEAT : This Toolkit Aims To Help Forensicators Perform Acquisitions","description":"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/meat\/","og_locale":"en_US","og_type":"article","og_title":"MEAT : This Toolkit Aims To Help Forensicators Perform Acquisitions","og_description":"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).","og_url":"https:\/\/kalilinuxtutorials.com\/meat\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-09-16T13:39:52+00:00","article_modified_time":"2021-09-16T13:39:55+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/meat\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/meat\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"MEAT : This Toolkit Aims To Help Forensicators Perform Different Kinds Of Acquisitions On iOS Devices","datePublished":"2021-09-16T13:39:52+00:00","dateModified":"2021-09-16T13:39:55+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/meat\/"},"wordCount":306,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","keywords":["Acquisitions","Forensicators","iOS Devices","MEAT"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/meat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/meat\/","url":"https:\/\/kalilinuxtutorials.com\/meat\/","name":"MEAT : This Toolkit Aims To Help Forensicators Perform Acquisitions","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","datePublished":"2021-09-16T13:39:52+00:00","dateModified":"2021-09-16T13:39:55+00:00","description":"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/meat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/meat\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33099,"url":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/","url_meta":{"origin":17790,"position":0},"title":"M.E.A.T. &#8211; Pioneering Mobile Forensics With The Mobile Evidence Acquisition Toolkit","author":"Varshini","date":"May 16, 2024","format":false,"excerpt":"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates comprehensive data acquisition from iOS devices, with planned expansion to Android. M.E.A.T. equips forensic experts with the tools needed to execute logical and filesystem acquisitions seamlessly, paving the way for advanced mobile forensics\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36876,"url":"https:\/\/kalilinuxtutorials.com\/trigon\/","url_meta":{"origin":17790,"position":1},"title":"Trigon : A Revolutionary Kernel Exploit For iOS","author":"Varshini","date":"March 6, 2025","format":false,"excerpt":"Trigon is a sophisticated deterministic kernel exploit targeting Apple\u2019s iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie CG and collaborators, introduces a groundbreaking approach to kernel exploitation by ensuring reliability and stability during and after execution. Unlike traditional methods prone to instability, Trigon guarantees deterministic outcomes, making\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32831,"url":"https:\/\/kalilinuxtutorials.com\/osinter-and-hacking-tools\/","url_meta":{"origin":17790,"position":2},"title":"OSINTer And Hacking Tools &#8211; Advancing Cybersecurity Research And Threat Analysis","author":"Varshini","date":"April 23, 2024","format":false,"excerpt":"In the rapidly evolving landscape of cybersecurity, the \"OSINTer & Hacking Tools\" program emerges as a cutting-edge toolkit designed for OSINT researchers and hackers alike. Built on Python, this versatile suite has expanded beyond its initial scope, incorporating a wealth of features from mobile tracking to vulnerability analysis. As it\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgGcx16OR8ri70hJ11Q8ELS7mET2qjL-oZbWI_raImeeB1o1kyPHt7MW7Yde09AFrTfrlOUSGcYyM-L80hhvyUbpg6MjFKvRd62jWIi-1KYPrzdNk4MvLX8D7IAtmDasAgoeHV5JzGnLfQWPQGkOI_FNFi54zdaeKVseW1dQkdc959272BaHfT1Bfi616Nz\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%283%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgGcx16OR8ri70hJ11Q8ELS7mET2qjL-oZbWI_raImeeB1o1kyPHt7MW7Yde09AFrTfrlOUSGcYyM-L80hhvyUbpg6MjFKvRd62jWIi-1KYPrzdNk4MvLX8D7IAtmDasAgoeHV5JzGnLfQWPQGkOI_FNFi54zdaeKVseW1dQkdc959272BaHfT1Bfi616Nz\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%283%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgGcx16OR8ri70hJ11Q8ELS7mET2qjL-oZbWI_raImeeB1o1kyPHt7MW7Yde09AFrTfrlOUSGcYyM-L80hhvyUbpg6MjFKvRd62jWIi-1KYPrzdNk4MvLX8D7IAtmDasAgoeHV5JzGnLfQWPQGkOI_FNFi54zdaeKVseW1dQkdc959272BaHfT1Bfi616Nz\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%283%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgGcx16OR8ri70hJ11Q8ELS7mET2qjL-oZbWI_raImeeB1o1kyPHt7MW7Yde09AFrTfrlOUSGcYyM-L80hhvyUbpg6MjFKvRd62jWIi-1KYPrzdNk4MvLX8D7IAtmDasAgoeHV5JzGnLfQWPQGkOI_FNFi54zdaeKVseW1dQkdc959272BaHfT1Bfi616Nz\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%283%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgGcx16OR8ri70hJ11Q8ELS7mET2qjL-oZbWI_raImeeB1o1kyPHt7MW7Yde09AFrTfrlOUSGcYyM-L80hhvyUbpg6MjFKvRd62jWIi-1KYPrzdNk4MvLX8D7IAtmDasAgoeHV5JzGnLfQWPQGkOI_FNFi54zdaeKVseW1dQkdc959272BaHfT1Bfi616Nz\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%283%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgGcx16OR8ri70hJ11Q8ELS7mET2qjL-oZbWI_raImeeB1o1kyPHt7MW7Yde09AFrTfrlOUSGcYyM-L80hhvyUbpg6MjFKvRd62jWIi-1KYPrzdNk4MvLX8D7IAtmDasAgoeHV5JzGnLfQWPQGkOI_FNFi54zdaeKVseW1dQkdc959272BaHfT1Bfi616Nz\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%283%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11313,"url":"https:\/\/kalilinuxtutorials.com\/7-best-apps-to-hack-girlfriends-phone-to-view-text-messages\/","url_meta":{"origin":17790,"position":3},"title":"7 Best Apps to Hack Girlfriend&#8217;s Phone to View Text Messages","author":"Balaji N","date":"August 10, 2020","format":false,"excerpt":"Ever got a gut feeling that your girl is seeing someone else behind your back or cheating on you? That can be very disheartening. But! If you want to make sure of this \u201cgut feeling\u201d- you will need some help. And we are not talking about any overpaid detective or\u2026","rel":"","context":"In &quot;Android Security&quot;","block_context":{"text":"Android Security","link":"https:\/\/kalilinuxtutorials.com\/category\/android-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":25735,"url":"https:\/\/kalilinuxtutorials.com\/frida-ios-hook\/","url_meta":{"origin":17790,"position":4},"title":"Frida-Ios-Hook\u00a0: A Tool That Helps You Easy Trace Classes, Functions, And Modify The Return Values","author":"R K","date":"June 30, 2022","format":false,"excerpt":"Frida-Ios-Hook, a tool that helps you can easy using frida. It support script for trace classes, functions, and modify the return values of methods on iOS platform. Env OS Support OSSupportedNotedMacOS\u2705mainLinux\u2705subWindows\u2705sub Compatible with iOSFridaSupported13.2.314.2.13\u270514.4.214.2.13\u270514.4.215.0.18\u2705 Feature Running with python3.x Support both spawn & attach script to process. [+] Options:-p(--package) Identifier of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxlvRJBX_KQ71xQ55u87N8l0zVhr2VMEnfJUWkrMxsLn1nnNjW1ih2BTPBXXwntzZJNDu-oqsO0f3QGHSeUOCZY_3-BMBkf8ZcMWOrcJv4TuFnx3rqS11cvz5yJ3TE_jta_ET4v5E1y34mgkhpJ_E3ZTm2bSiLSJmCJpyZWk1YQJgozr3LSu2QXOfw\/s728\/frida-ios-hook_1-753478%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxlvRJBX_KQ71xQ55u87N8l0zVhr2VMEnfJUWkrMxsLn1nnNjW1ih2BTPBXXwntzZJNDu-oqsO0f3QGHSeUOCZY_3-BMBkf8ZcMWOrcJv4TuFnx3rqS11cvz5yJ3TE_jta_ET4v5E1y34mgkhpJ_E3ZTm2bSiLSJmCJpyZWk1YQJgozr3LSu2QXOfw\/s728\/frida-ios-hook_1-753478%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxlvRJBX_KQ71xQ55u87N8l0zVhr2VMEnfJUWkrMxsLn1nnNjW1ih2BTPBXXwntzZJNDu-oqsO0f3QGHSeUOCZY_3-BMBkf8ZcMWOrcJv4TuFnx3rqS11cvz5yJ3TE_jta_ET4v5E1y34mgkhpJ_E3ZTm2bSiLSJmCJpyZWk1YQJgozr3LSu2QXOfw\/s728\/frida-ios-hook_1-753478%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxlvRJBX_KQ71xQ55u87N8l0zVhr2VMEnfJUWkrMxsLn1nnNjW1ih2BTPBXXwntzZJNDu-oqsO0f3QGHSeUOCZY_3-BMBkf8ZcMWOrcJv4TuFnx3rqS11cvz5yJ3TE_jta_ET4v5E1y34mgkhpJ_E3ZTm2bSiLSJmCJpyZWk1YQJgozr3LSu2QXOfw\/s728\/frida-ios-hook_1-753478%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":33343,"url":"https:\/\/kalilinuxtutorials.com\/ios-frequent-locations-dumper\/","url_meta":{"origin":17790,"position":5},"title":"iOS Frequent Locations Dumper &#8211; A Comprehensive Guide To Extracting Location Data","author":"Varshini","date":"June 13, 2024","format":false,"excerpt":"A powerful tool designed to extract and decode location data stored on iOS devices. By accessing the StateModel#.archive files, users can effectively dump location data into various formats, including KML and CSV. This guide provides a detailed walkthrough on using the script, along with necessary dependencies and usage examples to\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgM5vNR-i6QXl6asLy9oXCTm0qThywwXls0nwCBW1aP-W0OpXIDJa9zXRLW7zlGu7uYHItRKhnWh_e7tEVBEZUu6oJSxGFNMeuo5Uq5Tkj06KYU78EPwrl9dB4I-A70w4l6w6b6rzJ7wvJGK1uhOau2LzDuu62oadRAl7wroMct9qHCGZXu3kRCd5Lt2tGt\/s16000\/image-asset.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgM5vNR-i6QXl6asLy9oXCTm0qThywwXls0nwCBW1aP-W0OpXIDJa9zXRLW7zlGu7uYHItRKhnWh_e7tEVBEZUu6oJSxGFNMeuo5Uq5Tkj06KYU78EPwrl9dB4I-A70w4l6w6b6rzJ7wvJGK1uhOau2LzDuu62oadRAl7wroMct9qHCGZXu3kRCd5Lt2tGt\/s16000\/image-asset.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgM5vNR-i6QXl6asLy9oXCTm0qThywwXls0nwCBW1aP-W0OpXIDJa9zXRLW7zlGu7uYHItRKhnWh_e7tEVBEZUu6oJSxGFNMeuo5Uq5Tkj06KYU78EPwrl9dB4I-A70w4l6w6b6rzJ7wvJGK1uhOau2LzDuu62oadRAl7wroMct9qHCGZXu3kRCd5Lt2tGt\/s16000\/image-asset.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgM5vNR-i6QXl6asLy9oXCTm0qThywwXls0nwCBW1aP-W0OpXIDJa9zXRLW7zlGu7uYHItRKhnWh_e7tEVBEZUu6oJSxGFNMeuo5Uq5Tkj06KYU78EPwrl9dB4I-A70w4l6w6b6rzJ7wvJGK1uhOau2LzDuu62oadRAl7wroMct9qHCGZXu3kRCd5Lt2tGt\/s16000\/image-asset.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgM5vNR-i6QXl6asLy9oXCTm0qThywwXls0nwCBW1aP-W0OpXIDJa9zXRLW7zlGu7uYHItRKhnWh_e7tEVBEZUu6oJSxGFNMeuo5Uq5Tkj06KYU78EPwrl9dB4I-A70w4l6w6b6rzJ7wvJGK1uhOau2LzDuu62oadRAl7wroMct9qHCGZXu3kRCd5Lt2tGt\/s16000\/image-asset.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgM5vNR-i6QXl6asLy9oXCTm0qThywwXls0nwCBW1aP-W0OpXIDJa9zXRLW7zlGu7uYHItRKhnWh_e7tEVBEZUu6oJSxGFNMeuo5Uq5Tkj06KYU78EPwrl9dB4I-A70w4l6w6b6rzJ7wvJGK1uhOau2LzDuu62oadRAl7wroMct9qHCGZXu3kRCd5Lt2tGt\/s16000\/image-asset.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/17790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=17790"}],"version-history":[{"count":6,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/17790\/revisions"}],"predecessor-version":[{"id":17796,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/17790\/revisions\/17796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/17797"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=17790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=17790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=17790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}