Mac Forensics MCP
The macOS Digital Forensics and Incident Response MCP Server provides 23 structured forensics analysis tools, supporting cross - evidence correlation analysis of unified logs, file system events, user activities, etc., to help investigators efficiently conduct macOS incident investigations.
rating : 2.5 points
downloads : 0
What is the macOS Digital Forensics MCP Server?
This is an MCP server specifically designed for macOS system digital forensics and incident response (DFIR). It converts complex macOS forensics data (such as system logs, file system events, user activity records, etc.) into a structured query interface, allowing investigators to quickly obtain key evidence through simple queries without manually parsing a large number of raw data files.How to use the macOS Digital Forensics MCP Server?
After installation and configuration, you can directly query macOS forensics data through AI assistants that support the MCP protocol, such as Claude. Simply provide the path to the forensics data directory, and you can use 23 dedicated tools for analysis, including searching for security events, building timelines, and analyzing user activities.Use Cases
It is suitable for scenarios such as security incident investigations, internal threat detection, compliance audits, and malware analysis. It is particularly suitable for security teams and forensics analysts who need to quickly analyze macOS system activities, track user behavior, and detect abnormal activities.Main Features
Unified Log Analysis
Automatically parse the macOS unified log system and provide predefined security event detection patterns, such as user creation, SSH sessions, and privilege escalation.
Timeline Construction
Automatically build a unified timeline from multiple forensics data sources (logs, file system events, databases) to show the sequence of events.
User Activity Analysis
Track all activities of a specific user, including logins/logouts, file access, application usage, and network activities.
File System Forensics
Analyze FSEvents file system events, Spotlight indexes, and extended attributes to track the creation, modification, deletion, and access of files.
Browser History Analysis
Extract and analyze Safari browsing history, search queries, and download records to understand the user's network activities.
Privilege Audit
Check TCC (Transparency, Consent, and Control) privilege settings to see which applications have obtained sensitive privileges such as camera, microphone, and screen recording.
External Device Detection
Detect the connection and usage of external storage devices by analyzing fsck_apfs logs.
In - depth Event Investigation
Conduct in - depth cross - data source correlation analysis for specific security event types (such as user deletion and malware execution).
Advantages
Structured queries replace raw data searches, greatly improving investigation efficiency
Automatic timestamp conversion, uniformly displayed as readable UTC time
Predefined security event patterns for quickly discovering suspicious activities
Cross - data source correlation analysis provides a complete view of events
Pagination processing of large data sets to avoid context overflow
Automatically discover available forensics data without manually locating files
Limitations
Requires pre - collection of macOS system forensics data
Relies on external parsing tools to process certain raw formats
Primarily targeted at macOS systems and not suitable for other operating systems
Requires a Python environment and related dependencies
Some advanced features require professional forensics knowledge for correct interpretation
How to Use
Install Dependencies
Ensure that Python 3.10+ and the uv package manager are installed on the system. Then create a virtual environment and install the dependencies.
Configure Claude
Add the MCP server to the Claude configuration. You can choose user - level or project - level configuration.
Prepare Forensics Data
Collect forensics data from the macOS system, including log files, databases, configuration files, etc., and organize them into a specified directory.
Start Analysis
Use the provided 23 tools through AI assistants such as Claude for forensics analysis.
Usage Examples
Investigate Abnormal User Account Deletion
The security team received an alert and found that a user account was abnormally deleted. Use the MCP server to quickly investigate the relevant evidence of the deletion event.
Analyze Suspicious File Downloads
Suspicious files were detected to be downloaded on the system. You need to understand the source of the files, the download time, and the related user activities.
Build an Intrusion Timeline
The system may have been invaded. You need to build a complete timeline to understand the attacker's activity trajectory.
Audit Privilege Abuse
Investigate whether any applications abuse system privileges, such as unauthorized screen recording or camera access.
Frequently Asked Questions
What type of forensics data do I need to use this tool?
Can this tool monitor the system in real - time?
Do I need professional forensics knowledge to use it?
Which macOS versions are supported?
Will the data be sent to the cloud?
How to handle encrypted forensics data?
Related Resources
SANS FOR518 macOS Forensic Analysis Poster
A quick reference guide for macOS and iOS forensic analysis
mac4n6 Forensics Artifacts Spreadsheet
A comprehensive reference for macOS forensics artifacts
SUMURI Mac Forensics Best Practices Guide 2025
The latest macOS forensics methods and best practices
Google Cloud - Reviewing macOS Unified Logs
A technical guide for macOS unified log analysis
GitHub Repository
Source code and issue tracking for the MCP server

Gitlab MCP Server
Certified
The GitLab MCP server is a project based on the Model Context Protocol that provides a comprehensive toolset for interacting with GitLab accounts, including code review, merge request management, CI/CD configuration, and other functions.
TypeScript
24.6K
4.3 points

Markdownify MCP
Markdownify is a multi-functional file conversion service that supports converting multiple formats such as PDFs, images, audio, and web page content into Markdown format.
TypeScript
35.5K
5 points

Notion Api MCP
Certified
A Python-based MCP Server that provides advanced to-do list management and content organization functions through the Notion API, enabling seamless integration between AI models and Notion.
Python
21.4K
4.5 points

Duckduckgo MCP Server
Certified
The DuckDuckGo Search MCP Server provides web search and content scraping services for LLMs such as Claude.
Python
73.1K
4.3 points

Figma Context MCP
Framelink Figma MCP Server is a server that provides access to Figma design data for AI programming tools (such as Cursor). By simplifying the Figma API response, it helps AI more accurately achieve one - click conversion from design to code.
TypeScript
65.6K
4.5 points

Unity
Certified
UnityMCP is a Unity editor plugin that implements the Model Context Protocol (MCP), providing seamless integration between Unity and AI assistants, including real - time state monitoring, remote command execution, and log functions.
C#
32.3K
5 points

Gmail MCP Server
A Gmail automatic authentication MCP server designed for Claude Desktop, supporting Gmail management through natural language interaction, including complete functions such as sending emails, label management, and batch operations.
TypeScript
22.1K
4.5 points

Context7
Context7 MCP is a service that provides real-time, version-specific documentation and code examples for AI programming assistants. It is directly integrated into prompts through the Model Context Protocol to solve the problem of LLMs using outdated information.
TypeScript
97.3K
4.7 points





