A command-line Python tool for looking up application and device information, collecting and parsing data from various sources, and generating file hashes.
git clone https://github.com/campwill/digkit.git
cd digkit
pip install .
This installs digkit
as a command-line tool.
digkit [-h] <command> ...
Look up information associated with application and device identifiers.
- bundleid: Identifies application names from bundle IDs across app stores (Apple, Google, and Galaxy).
Collect, process, and parse information from various data sources.
-
database: Parses notable artifacts from a selection of supported databases:
dwbcommon
: Decodes usage events from dwbCommon.db.notestore
: Extracts Apple secure note hashes (in hashcat format) from NoteStore.sqlite.
-
warrant: Tools used for preparing Apple warrant return data.
- download: Downloads all .gpg files from an Apple-supplied .csv file.
- decrypt: Decrypts all downloaded .gpg files from within a single diretory.
Apply common hashing algorithms (MD5, SHA1, SHA256) to files.
Below are some examples of possible commands:
Bundle ID Lookup
# command
digkit lookup bundleid -s apple com.toyopagroup.picaboo
# output
Snapchat
Parsing NoteStore.sqlite
# command
digkit parse database -d notestore -i NoteStore.sqlite -o . -f txt
# output
Saved TXT: ./notestore.txt
File Hashing
# command
digkit hash -a md5 -i file.txt
# output
MD5 (file.txt): 3e924496fd0105e8bbbb872030465995
I plan to add the following features:
- ICCID and IMEI lookup
- Cache.sqlite and knowledgeC.db parsers
- Apple warrant return parser
- comparitive hashing features