In post-incident malware investigations, fast and reliable tools are critical for uncovering persistence mechanisms. One such tool I recently discovered is KnockKnock—a free, open-source utility by Objective-See that reveals persistently installed software components on macOS
Why It Matters
Once malware infects a system, it typically establishes persistence through:
- Launch Agents/Daemons
- Browser Extensions
- Cron Jobs
- Login Items
- Kernel Extensions
KnockKnock automates detection of these persistence mechanisms, providing visibility into what’s set to automatically execute on your Mac.

Key Features
Comprehensive Persistence Scanner
Checks 60+ persistence locations (more than macOS’s built-in tools)
VirusTotal Integration
Automatically checks items against VirusTotal’s malware database
Open Source & Transparent
Fully inspectable code on GitHub
No Installation Needed
Runs as a standalone application
Download: https://objective-see.org/products/knockknock.html
Source Code: GitHub Repository