ArtifactExtractor Logo

ArtifactExtractor

0
Free
Visit Website

ArtifactExtractor is a script that extracts common Windows artifacts from source images and VSCs. Artifacts in VSCs will be checked (via hash) if they are different from a later VSC/image copy before extraction. Dependencies: - None if using release executable on Windows. - Else: Install backports.lzma - Windows: Use latest wheel file available from [here] - Linux: Use a package manager, e.g. sudo apt install liblzma-dev - Install libewf libewf-legacy should be installed rather than libewf (experimental) - Newer experimental releases have a file corruption issue. - Windows: Use the MSI installer available from [here] - Linux: Use libewf-legacy build 20140806 (Windows ONLY) - Install pywin32: pip install pywin32 - Install remaining requirements: use requirements.txt - Use pip: pip install -r requirements.txt Usage: Create destination directory artifact_extractor.exe <source image> <dest dir> [-a <selected artifacts>] or artifact_extractor.exe -h for more options Credits: Joachim Metz and his libraries, John Corcoran for Unix Compatibility

FEATURES

ALTERNATIVES

View physical memory as files in a virtual file system for easy memory analysis and artifact access.

Truehunter is a tool designed to detect encrypted containers with a focus on Truecrypt and Veracrypt, utilizing a fast and memory efficient approach.

A Kernel fuzzer focusing on race bugs

Orochi is a collaborative forensic memory dump analysis framework.

Belkasoft offers cybersecurity solutions, training, and tools for businesses, law enforcement, and academia.

Fridump is an open source memory dumping tool using the Frida framework for dumping memory addresses from various platforms.

A tool for discovering, analyzing, and remedying sensitive data

Collects and organizes Linux OS data for detailed analysis and incident response.