Enterprise-grade forensic acquisition and incident response tool for macOS systems
Features • Installation • Quick Start • Documentation • Contributing
MacFIRE is a comprehensive forensic acquisition and incident response tool designed specifically for macOS systems. It empowers digital forensic investigators, security analysts, and incident responders to:
- Collect critical forensic artifacts from macOS systems
- Analyze system state with live triage capabilities
- Detect indicators of compromise using integrated IOC scanning
- Image disks with forensic integrity verification
- Report findings with detailed HTML reports
- Live Triage Mode - Rapid system assessment for active incidents
- MITRE ATT&CK Mapping - Findings mapped to ATT&CK techniques
- IOC Scanning - Detect known indicators of compromise
- Persistence Analysis - Automated detection of persistence mechanisms
| Category | Description |
|---|---|
| System Information | Hardware, software, kernel details |
| File System | Logs, Spotlight metadata, quarantine events |
| User Data | Preferences, keychains, messages, browser data |
| System Security | TCC database, firewall rules, SIP status |
| Network | Interfaces, connections, DNS, WiFi history |
| Running System | Processes, open files, kernel extensions |
| Browser Data | Safari, Chrome, Firefox history & cookies |
| Apple Unified Logs | System logs, security events, sudo history |
| USB History | Device connection history, lockdown records |
| iCloud Artifacts | Cloud sync data, CloudKit cache |
| Persistence | LaunchAgents, LaunchDaemons, cron, login items |
- Disk Imaging - Raw disk acquisition with SHA-256 verification
- Memory Analysis - Volatile data collection and process analysis
- Rootkit Detection - Scan for known rootkit signatures
- Timeline Generation - System activity chronology
- Browser Forensics - Extract and analyze web browser data
- Encrypted Volume Analysis - FileVault and APFS encryption detection
- macOS Catalina (10.15) or later
- Python 3.8+
- Administrative privileges (for complete artifact collection)
# Clone the repository
git clone https://github.com/Masriyan/MacFIRE.git
cd MacFIRE
# Make executable
chmod +x macfire.py
# Verify installation
python3 macfire.py --version# Perform rapid incident assessment
sudo python3 macfire.py --live-triage ./triage_output# Full forensic collection
sudo python3 macfire.py --collect-artifacts ./evidence --compress# See all artifact categories
python3 macfire.py --list-categories# Create forensic disk image
sudo python3 macfire.py --create-raw ./disk_images| Command | Description |
|---|---|
--live-triage PATH |
Perform live incident triage |
--collect-artifacts PATH |
Collect forensic artifacts |
--categories CAT [CAT...] |
Collect specific categories |
--list-categories |
List all artifact categories |
--create-raw PATH |
Create raw disk image |
--memory-dump PATH |
Acquire memory artifacts |
--rootkit-check PATH |
Scan for rootkits |
--browser-history PATH |
Extract browser data |
--system-timeline PATH |
Generate activity timeline |
--generate-report PATH |
Create HTML report |
Full Incident Response:
# 1. Live triage for immediate assessment
sudo python3 macfire.py --live-triage ./ir_case001
# 2. Collect persistence-related artifacts
sudo python3 macfire.py --collect-artifacts ./ir_case001 \
--categories "Persistence Mechanisms" "System Security" "Running System"
# 3. Generate forensic report
python3 macfire.py --generate-report ./ir_case001 --artifacts-path ./ir_case001/artifacts_*Targeted Browser Investigation:
python3 macfire.py --browser-history ./browser_evidence
python3 macfire.py --collect-artifacts ./browser_evidence --categories "Browser Data"- 100% Local Processing - No data transmitted externally
- Chain of Custody - SHA-256 hashes for all artifacts
- Audit Logging - Complete operation trail
- Minimal Footprint - No permanent system modifications
We welcome contributions! Please see CONTRIBUTING.md for guidelines.
# Development setup
git clone https://github.com/Masriyan/MacFIRE.git
cd MacFIRE
python3 -m venv venv
source venv/bin/activateThis project is licensed under the MIT License - see the LICENSE file for details.
- Sudo3rs - Lead Developer - security-life.org
MacFIRE should only be used for legitimate forensic investigations, security research, or system administration tasks where proper authorization has been obtained. The authors are not responsible for misuse or illegal applications.
Made with 🔥 by the Sudo3rs Team
