The only required argument is the directory, but the output can include binary BLOB hex dump of the Bookmark data (-blob). This script parses the following plist files: The script is meant to be run on a directory this can be a directory of extracted plist files from an image, a directory on your own system (ie: ~/Library), or from a mounted image (ie: /Volumes/mounted_image_file/Users//), you get the idea. Get the script here from my Github page. I hope you find the script useful!
Nothing fancy, just text printed to standard output. In order to analyze them better ( and student requests) I wrote a Python script to output the contents of these files in an easier to read format. I’ve also included the ‘older’ format plist files used in OS X 10.10 and older. They make analysis hard because they are binary plist files using the NSKeyedArchiver format – see here for my manual analysis of these files. I have been studying the new SFL-based MRU plist files found in OS X 10.11.