Jake Valletta has written a script capable of parsing Apple Push Notification (“APN”) .pushstore files. It is designed to parse “.pushstore” files found on iOS devices for potential forensic artifacts. These files are typically found in the /var/mobile/Library/SpringBoard/PushStore/ directory, and are stored in a binary Property List (“plist”) format.
The author highly recommends reading this blog post on parsing and understanding NSKeyedArchiver plists.
You can download the script from his GitHub.