FSEvents files are written to disk by macOS APIs and contain historical records
of file system activity that occurred for a particular volume. They can be
found on devices running macOS and devices that were plugged in to a device
running macOS. fse_dump can be used to parse FSEvents files from the
/System/Volumes/Data/.fseventsd/ on a live system or FSEvents files
extracted from an image.
- Parse FSEvents files from macOS (versions 1, 2, and 3)
- Export to multiple formats: CSV, JSON, YAML
- Filter events by path (regex) and flags
- Compress output with gzip or zstd
- Watch mode for real-time parsing of new FSEvents files
- Generate unique path/operation summaries
- Fast parallel processing with memory-efficient design
cargo install fse_dumpgit clone https://github.com/lespea/fse_dump
cd fse_dump
cargo build --release# Build with zstd compression support
cargo install fse_dump --features zstd
# Build with watch mode (requires notify)
cargo install fse_dump --features watch
# Build with all features
cargo install fse_dump --all-features# Parse default FSEvents directory to JSON
fse_dump dump --json output.json
# Parse with compression
fse_dump dump --json output.json.gz
# Parse specific files
fse_dump dump --json output.json /path/to/fsevent/file1 /path/to/file2# Filter by path (regex)
fse_dump dump --json output.json -p ".*\.pdf$"
# Filter by any of the specified flags
fse_dump dump --json output.json -f Created Modified
# Filter requiring all specified flags
fse_dump dump --json output.json --all-flags FileEvent Modified
# Combine filters
fse_dump dump --json output.json \
-p "/Users/.*" \
-f Created Removed# Watch for new FSEvents files and output as JSON
fse_dump watch
# Watch with filters
fse_dump watch -o json -P \
-p ".*\.docx?$" \
-f ModifiedUsage: fse_dump <COMMAND>
Commands:
dump Dump fsevents file into the wanted output files/format
watch Watch for new fse files, parse them, and write them to the desired output
generate Outputs shell completions for the desired shell
help Print this message or the help of the given subcommand(s)
Options:
-h, --help Print help
-V, --version Print version
The dump command parses FSEvents files and outputs them in various formats.
fse_dump dump [OPTIONS] [FILES]...[FILES]...- The FSEvents files to parse (default:/System/Volumes/Data/.fseventsd/)- Can be individual files or directories
- Directories are scanned for files with hex-only filenames
- Files are sorted by name before processing
Individual File Output (creates output file next to each input file):
--csvs- Create.csvfile for each FSEvents file--jsons- Create.jsonfile for each FSEvents file--yamls- Create.yamlfile for each FSEvents file
Combined Output (all records in one file):
-c, --csv <FILE>- Write all records to a single CSV file-j, --json <FILE>- Write all records to a single JSON file-y, --yaml <FILE>- Write all records to a single YAML file-u, --uniques <FILE>- Write unique paths with combined operations to CSV
Use - as the filename to write to stdout:
fse_dump dump --json - | jq .Automatic Compression (based on file extension):
# Gzip compression (automatic)
fse_dump dump --json output.json.gz
# Zstd compression (automatic, requires zstd feature)
fse_dump dump --json output.json.zstForce Compression:
--gzip- Force gzip compression (even for stdout)--zstd- Force zstd compression (requires zstd feature)-l, --glevel <0-9>- Gzip compression level (default: 7)--zlevel <0-20>- Zstd compression level (default: 10)--zthreads <N>- Zstd threads (default: 2, 0 to disable)
-d, --days <N>- Only process files modified in the last N days (default: 90)- Set to 0 to process all files regardless of age
- Based on file modification/creation time
Filter which events are included in the output:
Path Filtering:
-p, --path-filter <REGEX>- Only include events matching the regex pattern
# Only PDF files
fse_dump dump --json output.json -p "\.pdf$"
# Only files in /Users directory
fse_dump dump --json output.json --path-filter "^/Users/"
# Multiple patterns (use regex alternation)
fse_dump dump --json output.json -p "\.(pdf|docx?|xlsx?)$"Flag Filtering:
-f, --any-flags <FLAG>...- Include events with ANY of these flags--all-flags <FLAG>...- Include events with ALL of these flags
These options are mutually exclusive.
Available Flags:
| Flag | Description |
|---|---|
FolderEvent |
Event occurred on a folder |
Mount |
Volume was mounted |
Unmount |
Volume was unmounted |
EndOfTransaction |
End of a transaction |
LastHardLinkRemoved |
Last hard link to file removed |
HardLink |
Hard link created |
SymbolicLink |
Symbolic link created |
FileEvent |
Event occurred on a file |
PermissionChange |
Permissions were changed |
ExtendedAttrModified |
Extended attributes modified |
ExtendedAttrRemoved |
Extended attributes removed |
DocumentRevisioning |
Document versioning event |
ItemCloned |
Item was cloned |
Created |
File/folder was created |
Removed |
File/folder was removed |
InodeMetaMod |
Inode metadata modified |
Renamed |
File/folder was renamed |
Modified |
File/folder was modified |
Exchange |
Files exchanged |
FinderInfoMod |
Finder info modified |
FolderCreated |
Folder was created |
Flag names are case-insensitive.
Examples:
# Find all file creation or removal events
fse_dump dump --json output.json -f Created Removed
# Find all modified files (not folders)
fse_dump dump --json output.json --all-flags FileEvent Modified
# Find files created in the Documents folder
fse_dump dump --json output.json \
-p "/Documents/" \
-f Created
# Find permission changes on system files
fse_dump dump --json output.json \
-p "^/(System|Library)/" \
-f PermissionChange# Parse last 30 days to compressed JSON
fse_dump dump --days 30 --json events.json.gz
# Create CSV and JSON for each FSEvents file
fse_dump dump --csvs --jsons
# Export unique paths to CSV
fse_dump dump --uniques unique_paths.csv
# Parse specific file to stdout with filters
fse_dump dump --json - \
-p "/Users/alice/" \
-f Modified Created \
/path/to/fsevent/file
# Multiple outputs with compression
fse_dump dump \
--json all_events.json.gz \
--csv all_events.csv.gz \
--uniques unique_paths.csv \
--days 7The watch command monitors directories for new FSEvents files and parses them in real-time.
fse_dump watch [OPTIONS] [WATCH_DIRS]...[WATCH_DIRS]...- Directories to watch (default:/System/Volumes/Data/.fseventsd/)
-o, --format <FORMAT>- Output format:csv,json, oryaml(default:json)-P, --pretty- Pretty-print JSON output (multi-line formatting)--poll- Use polling instead of native file system events (slower but more compatible)
Compression options (same as dump command):
--gzip,--zstd,-l, --glevel,--zlevel,--zthreads
Filtering options (same as dump command):
-p, --path-filter <REGEX>-f, --any-flags <FLAG>...--all-flags <FLAG>...
# Watch default directory and output JSON to stdout
fse_dump watch
# Watch with pretty-printed JSON
fse_dump watch -o json -P
# Watch and filter for document changes
fse_dump watch \
-p "\.(doc|pdf|txt)$" \
-f Modified Created
# Watch custom directory with CSV output
fse_dump watch -o csv /custom/fsevents/path
# Watch with compression (pipe to file)
fse_dump watch --gzip > events.json.gzGenerate shell completion scripts for various shells.
fse_dump generate <SHELL>bashelvishfishpowershellzsh
# Generate completions for bash
fse_dump generate bash > ~/.local/share/bash-completion/completions/fse_dump
# Generate completions for zsh
fse_dump generate zsh > ~/.zsh/completions/_fse_dump
# Generate completions for fish
fse_dump generate fish > ~/.config/fish/completions/fse_dump.fishEach FSEvents record contains the following fields:
{
"path": "/Users/alice/Documents/file.txt",
"event_id": "0x12ab34cd",
"flags": "FileEvent | Modified",
"node_id": "0x56ef78",
"extra_id": "0x9abc"
}path- Full path to the file/folderevent_id- Unique event identifier (hex format if built withhexfeature)flags- Human-readable flag names separated by|alt_flags- Alternative flag interpretation (if built withalt_flagsfeature)node_id- Inode number (v2 and v3 only, hex format if built withhexfeature)extra_id- Additional ID (v3 only, requiresextra_idfeature)
The --uniques option produces aggregated records:
path,counts,flags
/Users/alice/file.txt,5,"FileEvent | Modified | Created"
/Users/alice/Documents,3,"FolderEvent | Modified"path- The file/folder pathcounts- Number of events for this pathflags- Combined flags (bitwise OR of all events)
Find all deletions in user directories:
fse_dump dump --json deletions.json \
-p "^/Users/" \
-f RemovedFind renamed files (with old and new names):
fse_dump dump --json renames.json \
-f RenamedMonitor system configuration changes:
fse_dump dump --json system_changes.json \
-p "^/(System|Library|etc)/" \
-f Modified PermissionChangeFind cloned/copied files:
fse_dump dump --json clones.json \
-f ItemClonedjq for JSON processing:
# Extract just the paths
fse_dump dump --json - | jq -r '.path'
# Find events for a specific user
fse_dump dump --json - | jq 'select(.path | startswith("/Users/alice"))'
# Count events by flag
fse_dump dump --json - | jq -r '.flags' | sort | uniq -cgrep/awk for quick filtering:
# Find all PDF operations
fse_dump dump --json - | grep '\.pdf"'
# CSV processing with awk
fse_dump dump --csv - | awk -F',' '$3 ~ /Created/ {print $1}'- Use compression for large outputs to save disk space
- Use
--daysto limit processing to recent files - Apply filters early with
--path-filterand--any-flagsto reduce output size - Use CSV for the most compact output format
- Use
--uniqueswhen you only need summary statistics
Timeline analysis:
# Export everything from last 7 days
fse_dump dump --days 7 --json timeline.json.gzMalware detection (find suspicious file operations):
# Find new executables
fse_dump dump --json suspicious.json \
-p "\.(app|exe|sh|command|pkg|dmg)$" \
-f Created
# Find hidden files
fse_dump dump --json hidden.json \
-p "/\.[^/]+$" \
-f Created ModifiedData exfiltration (find removable media):
# Monitor mounts/unmounts
fse_dump dump --json removable.json \
-f Mount UnmountUser activity:
# Monitor specific user's home directory
fse_dump dump --json user_activity.json \
-p "^/Users/targetuser/" \
--days 30Optional features can be enabled during build:
zstd- Enable zstd compression supportwatch- Enable watch mode for real-time monitoringhex- Output numeric IDs in hexadecimal formatalt_flags- Include alternative flag interpretationsextra_id- Include extra_id field from v3 files
# Build with specific features
cargo build --release --features "zstd,watch"
# Build with all features
cargo build --release --all-features# Run tests
cargo test
# Run with debug logging
RUST_LOG=debug cargo run -- dump --json output.json
# Check code
cargo clippy
cargo fmtLicensed under either of
- Apache License, Version 2.0, (LICENSE-APACHE or http://www.apache.org/licenses/LICENSE-2.0)
- MIT license (LICENSE-MIT or http://opensource.org/licenses/MIT)
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.