HunterM is a digital forensics tool designed to collect and analyze key macOS forensic artifacts. It is useful for incident response, threat hunting, and compromise assessments.
- β Collects Login Items, Network Connections, Extended Zsh History
- β Retrieves System Information (OS, kernel, timezone)
- β Extracts Browser History (Safari, Chrome, Firefox)
- β Lists Installed Applications
- β Exports collected artifacts into structured reports
- β
No dependencies (except
colorama
for colored output)
Artifact | Description |
---|---|
Login Items | Applications that start automatically at login |
Network Connections | Active network connections (ESTABLISHED state) |
Zsh History | Extended shell history with timestamps |
System Information | OS version, kernel details, timezone |
Browser History | Safari, Chrome, and Firefox visited sites |
Installed Applications | Lists all installed applications |
Python HunterM.py -e output_directory