Mac Forensics MCP
M

Mac Forensics MCP

The macOS Digital Forensics and Incident Response MCP Server provides 23 structured forensics analysis tools, supporting cross - evidence correlation analysis of unified logs, file system events, user activities, etc., to help investigators efficiently conduct macOS incident investigations.
2.5 points
0

What is the macOS Digital Forensics MCP Server?

This is an MCP server specifically designed for macOS system digital forensics and incident response (DFIR). It converts complex macOS forensics data (such as system logs, file system events, user activity records, etc.) into a structured query interface, allowing investigators to quickly obtain key evidence through simple queries without manually parsing a large number of raw data files.

How to use the macOS Digital Forensics MCP Server?

After installation and configuration, you can directly query macOS forensics data through AI assistants that support the MCP protocol, such as Claude. Simply provide the path to the forensics data directory, and you can use 23 dedicated tools for analysis, including searching for security events, building timelines, and analyzing user activities.

Use Cases

It is suitable for scenarios such as security incident investigations, internal threat detection, compliance audits, and malware analysis. It is particularly suitable for security teams and forensics analysts who need to quickly analyze macOS system activities, track user behavior, and detect abnormal activities.

Main Features

Unified Log Analysis
Automatically parse the macOS unified log system and provide predefined security event detection patterns, such as user creation, SSH sessions, and privilege escalation.
Timeline Construction
Automatically build a unified timeline from multiple forensics data sources (logs, file system events, databases) to show the sequence of events.
User Activity Analysis
Track all activities of a specific user, including logins/logouts, file access, application usage, and network activities.
File System Forensics
Analyze FSEvents file system events, Spotlight indexes, and extended attributes to track the creation, modification, deletion, and access of files.
Browser History Analysis
Extract and analyze Safari browsing history, search queries, and download records to understand the user's network activities.
Privilege Audit
Check TCC (Transparency, Consent, and Control) privilege settings to see which applications have obtained sensitive privileges such as camera, microphone, and screen recording.
External Device Detection
Detect the connection and usage of external storage devices by analyzing fsck_apfs logs.
In - depth Event Investigation
Conduct in - depth cross - data source correlation analysis for specific security event types (such as user deletion and malware execution).
Advantages
Structured queries replace raw data searches, greatly improving investigation efficiency
Automatic timestamp conversion, uniformly displayed as readable UTC time
Predefined security event patterns for quickly discovering suspicious activities
Cross - data source correlation analysis provides a complete view of events
Pagination processing of large data sets to avoid context overflow
Automatically discover available forensics data without manually locating files
Limitations
Requires pre - collection of macOS system forensics data
Relies on external parsing tools to process certain raw formats
Primarily targeted at macOS systems and not suitable for other operating systems
Requires a Python environment and related dependencies
Some advanced features require professional forensics knowledge for correct interpretation

How to Use

Install Dependencies
Ensure that Python 3.10+ and the uv package manager are installed on the system. Then create a virtual environment and install the dependencies.
Configure Claude
Add the MCP server to the Claude configuration. You can choose user - level or project - level configuration.
Prepare Forensics Data
Collect forensics data from the macOS system, including log files, databases, configuration files, etc., and organize them into a specified directory.
Start Analysis
Use the provided 23 tools through AI assistants such as Claude for forensics analysis.

Usage Examples

Investigate Abnormal User Account Deletion
The security team received an alert and found that a user account was abnormally deleted. Use the MCP server to quickly investigate the relevant evidence of the deletion event.
Analyze Suspicious File Downloads
Suspicious files were detected to be downloaded on the system. You need to understand the source of the files, the download time, and the related user activities.
Build an Intrusion Timeline
The system may have been invaded. You need to build a complete timeline to understand the attacker's activity trajectory.
Audit Privilege Abuse
Investigate whether any applications abuse system privileges, such as unauthorized screen recording or camera access.

Frequently Asked Questions

What type of forensics data do I need to use this tool?
Can this tool monitor the system in real - time?
Do I need professional forensics knowledge to use it?
Which macOS versions are supported?
Will the data be sent to the cloud?
How to handle encrypted forensics data?

Related Resources

SANS FOR518 macOS Forensic Analysis Poster
A quick reference guide for macOS and iOS forensic analysis
mac4n6 Forensics Artifacts Spreadsheet
A comprehensive reference for macOS forensics artifacts
SUMURI Mac Forensics Best Practices Guide 2025
The latest macOS forensics methods and best practices
Google Cloud - Reviewing macOS Unified Logs
A technical guide for macOS unified log analysis
GitHub Repository
Source code and issue tracking for the MCP server

Installation

Copy the following command to your Client for configuration
{
  "mcpServers": {
    "mac-forensics": {
      "command": "/opt/macOS/mac_forensics-mcp/.venv/bin/python",
      "args": ["-m", "mac_forensics_mcp.server"],
      "env": {}
    }
  }
}

{
  "mcpServers": {
    "mac-forensics": {
      "command": "/opt/macOS/mac_forensics-mcp/.venv/bin/python",
      "args": ["-m", "mac_forensics_mcp.server"],
      "env": {
        "MAC_FORENSICS_UNIFIEDLOG_ITERATOR_PATH": "/custom/path/unifiedlog_iterator",
        "MAC_FORENSICS_FSEPARSER_PATH": "/custom/path/FSEParser.py",
        "MAC_FORENSICS_SPOTLIGHT_PARSER_PATH": "/custom/path/spotlight_parser.py"
      }
    }
  }
}
Note: Your key is sensitive information, do not share it with anyone.

Alternatives

S
Security Detections MCP
Security Detections MCP is a server based on the Model Context Protocol that allows LLMs to query a unified security detection rule database covering Sigma, Splunk ESCU, Elastic, and KQL formats. The latest version 3.0 is upgraded to an autonomous detection engineering platform that can automatically extract TTPs from threat intelligence, analyze coverage gaps, generate SIEM-native format detection rules, run tests, and verify. The project includes over 71 tools, 11 pre-built workflow prompts, and a knowledge graph system, supporting multiple SIEM platforms.
TypeScript
6.2K
4 points
M
MCP Windbg
An MCP server that integrates AI models with WinDbg/CDB for analyzing Windows crash dump files and remote debugging, supporting natural language interaction to execute debugging commands.
Python
11.6K
5 points
A
Aderyn
Aderyn is an open - source Solidity smart contract static analysis tool written in Rust, which helps developers and security researchers discover vulnerabilities in Solidity code. It supports Foundry and Hardhat projects, can generate reports in multiple formats, and provides a VSCode extension.
Rust
11.9K
5 points
M
MCP Scan
MCP-Scan is a security scanning tool for MCP servers, used to detect common security vulnerabilities such as prompt injection, tool poisoning, and cross-domain escalation.
Python
18.0K
5 points
A
Agentic Radar
Agentic Radar is a security scanning tool for analyzing and assessing agentic systems, helping developers, researchers, and security experts understand the workflows of agentic systems and identify potential vulnerabilities.
Python
14.6K
5 points
M
Mobile MCP
TypeScript
15.7K
4.5 points
I
Iterm MCP
iTerm-MCP is a server that provides model access for iTerm sessions, supporting efficient viewing of terminal output and full control.
TypeScript
11.1K
4 points
I
Ios Simulator MCP
The iOS Simulator MCP Server is a tool for interacting with the iOS simulator via the Model Context Protocol (MCP), supporting functions such as obtaining simulator information, controlling UI interactions, and checking UI elements.
TypeScript
11.9K
4 points
G
Gitlab MCP Server
Certified
The GitLab MCP server is a project based on the Model Context Protocol that provides a comprehensive toolset for interacting with GitLab accounts, including code review, merge request management, CI/CD configuration, and other functions.
TypeScript
24.6K
4.3 points
M
Markdownify MCP
Markdownify is a multi-functional file conversion service that supports converting multiple formats such as PDFs, images, audio, and web page content into Markdown format.
TypeScript
35.5K
5 points
N
Notion Api MCP
Certified
A Python-based MCP Server that provides advanced to-do list management and content organization functions through the Notion API, enabling seamless integration between AI models and Notion.
Python
21.4K
4.5 points
D
Duckduckgo MCP Server
Certified
The DuckDuckGo Search MCP Server provides web search and content scraping services for LLMs such as Claude.
Python
73.1K
4.3 points
F
Figma Context MCP
Framelink Figma MCP Server is a server that provides access to Figma design data for AI programming tools (such as Cursor). By simplifying the Figma API response, it helps AI more accurately achieve one - click conversion from design to code.
TypeScript
65.6K
4.5 points
U
Unity
Certified
UnityMCP is a Unity editor plugin that implements the Model Context Protocol (MCP), providing seamless integration between Unity and AI assistants, including real - time state monitoring, remote command execution, and log functions.
C#
32.3K
5 points
G
Gmail MCP Server
A Gmail automatic authentication MCP server designed for Claude Desktop, supporting Gmail management through natural language interaction, including complete functions such as sending emails, label management, and batch operations.
TypeScript
22.1K
4.5 points
C
Context7
Context7 MCP is a service that provides real-time, version-specific documentation and code examples for AI programming assistants. It is directly integrated into prompts through the Model Context Protocol to solve the problem of LLMs using outdated information.
TypeScript
97.3K
4.7 points
AIBase
Zhiqi Future, Your AI Solution Think Tank
© 2026AIBase