jfarley218 is a small, developer-focused publisher whose single public offering, iTunes Backup Reader, addresses the narrow but occasionally critical need to inspect Apple mobile-device backups from a Windows workstation. Written as a portable Python 3 script, the tool parses the Manifest.db and related files created by iTunes or Finder during an encrypted or unencrypted backup, exposing SMS, call logs, contacts, notes, Safari history, third-party app data, and media file paths in a human-readable CSV or JSON form. Forensic analysts, help-desk technicians, and privacy-conscious end-users employ it to verify what information is stored locally, to recover accidentally deleted threads, or to migrate select content to Android without restoring the entire image. Because the script operates offline and requires only read access to the backup folder, it leaves no forensic footprint on the host PC and avoids the licensing restrictions of commercial mobile suites. Updates are posted sporadically on the maintainer’s GitHub, with community pull requests handling new iOS schema changes. jfarley218’s software is available for free on get.nero.com, where the package is delivered through the winget repository, always fetching the newest commit, and can be installed individually or batched alongside other utilities.
Python 3 Script to parse out iTunes backups
Details