macOS forensics, done right.
Open-source artifact collection with forensically sound methodology. Built for DFIR professionals who need reliable evidence extraction from live systems and disk images.

Built for the way investigators actually work.
One static binary. Structured output. Defensible evidence handling. macfor turns macOS forensic collection into something you can trust and script.
Browser history, shell commands, system logs, FSEvents, Spotlight metadata. 30+ macOS artifacts, parsed into structured JSONL.
Engineered for defensible investigations.
Three pillars: deep coverage, evidence integrity, and a format your existing tools already understand.
Coverage
30+ artifacts across browsers, system, and user activity.
Safari, Chrome, Firefox, FSEvents, Unified Logs, Spotlight, Quick Look, Quarantine, TCC, Bluetooth, WiFi networks, persistence mechanisms, and more — all parsed into structured JSONL.
browser.safari browser.chrome browser.firefox shell.history filesystem.fsevents system.unifiedlogs system.spotlight system.quicklook system.tcc system.persistence system.quarantine system.coreanalytics system.patternoflife system.screentime mail.apple messages.apple facetime.apple contacts.addressbook pim.calendar notes.apple devices.bluetooth network.wifi messaging.signal messaging.whatsapp messaging.fbmessenger communication.slack app.discord cloudstorage.dropbox ... and more
Integrity
SHA-256 hashing, signed manifests, full chain of custody.
Every file is hashed at collection time. Every action is logged to the chain of custody. Manifests are signed and verifiable so your evidence holds up in review.
2026-05-01T09:14:22Z collection_started examiner=j.doe@acme.com host=MBP-FINANCE-04 2026-05-01T09:14:23Z plugin_invoked plugin=browser.safari 2026-05-01T09:14:23Z file_collected path=~/Library/Safari/History.db sha256=9f8a7c1e... 2026-05-01T09:14:24Z artifact_parsed plugin=browser.safari records=1284 2026-05-01T09:14:24Z file_collected path=~/.zsh_history sha256=4e2b81d3... 2026-05-01T09:15:09Z manifest_signed keyid=ED25519/4F8C 2026-05-01T09:15:09Z collection_complete duration=47s artifacts=18 sha256=c1a2...
Composability
Pipe straight into jq, your SIEM, or macfor's analysis platform.
Output is JSONL by default. Pipe it through jq, push it to Splunk or Elastic, or load it into macfor analyze for graph-powered timeline reconstruction. Your data, your tools.
30+ artifacts across browsers, system, and user activity.
Safari, Chrome, Firefox, FSEvents, Unified Logs, Spotlight, Quick Look, Quarantine, TCC, Bluetooth, WiFi networks, persistence mechanisms, and more — all parsed into structured JSONL.
SHA-256 hashing, signed manifests, full chain of custody.
Every file is hashed at collection time. Every action is logged to the chain of custody. Manifests are signed and verifiable so your evidence holds up in review.
Pipe straight into jq, your SIEM, or macfor's analysis platform.
Output is JSONL by default. Pipe it through jq, push it to Splunk or Elastic, or load it into macfor analyze for graph-powered timeline reconstruction. Your data, your tools.
browser.safari browser.chrome browser.firefox shell.history filesystem.fsevents system.unifiedlogs system.spotlight system.quicklook system.tcc system.persistence system.quarantine system.coreanalytics system.patternoflife system.screentime mail.apple messages.apple facetime.apple contacts.addressbook pim.calendar notes.apple devices.bluetooth network.wifi messaging.signal messaging.whatsapp messaging.fbmessenger communication.slack app.discord cloudstorage.dropbox ... and more

One command. Real evidence in under a minute.
Install macfor, run macfor collect, and walk away with a signed evidence container ready for analysis.
Free for the community, scalable for teams.
The collector is open source and free forever. Pro tiers add full artifact coverage, priority support, and enterprise deployment.
Community
Open-source collector for individual use
Free
- Shell history collection
- Safari browser artifacts
- Evidence container with hashing
- Chain of custody logging
- Community support
Professional
Full artifact coverage for teams
Coming soon
- All Community features
- Chrome, Firefox, Edge browsers
- Unified Logs (tracev3)
- FSEvents journal parsing
- Spotlight metadata
- Priority email support
Enterprise
For large teams and MSSPs
Coming soon
- All Professional features
- Keychain metadata
- Custom plugin development
- On-premises deployment
- Dedicated support channel
- SLA guarantees

Frequently asked questions
Can't find what you're looking for? Open a discussion on GitHub or reach out to our team.
Is the Collector really free?
Yes! The macfor Collector is open-source under the MIT license. You can use it for personal or commercial purposes at no cost.
When will Professional and Enterprise be available?
We're working on Pro and Enterprise tiers now. Get in touch via the contact form and we'll let you know the moment they're ready, including early-access pricing for waitlist sign-ups.
What's included in support?
Community tier includes community support via GitHub Discussions. Professional and Enterprise will include priority email and dedicated support channels respectively.
Do you offer discounts for non-profits or education?
Yes, we plan to offer 50% off for qualified non-profits and educational institutions when paid tiers launch. Contact us to be notified.
What happens to my data if I downgrade?
Your collected evidence remains yours. The collector and evidence format are open-source, so you can always access your data.