We changed our approach to live forensics acquisition, which means FastIR Collector is no longer maintained. We recommend using our new FastIR Artifacts collector instead. Concepts: This tool collects different artefacts on live Windows and records the results in csv or json files. With the analyses of these artefacts, an early compromission can be detected. Downloads: Binaries can be found in the release page of this project. Requirements: pywin32, python WMI, python psutil, python yaml, construct, distorm3, hexdump, pytz. Alternatively, a pip freeze output is available in reqs.pip. Compiling: To compile FastIR, you will need pyinstaller. Simply use pyinstaller pyinstaller.spec at the project root directory. The binary will by default be in /dist. Important: for x64 systems, check that your local python installation is also in x64. Execution: ./fastIR_x64.exe -h for help ./fastIR_x64.exe --packages fast extract all artefacts except dump and FileCatcher packages ./fastIR_x64.exe --packages dump --dump mft to extract MFT ./fastIR_x64.exe --packages all --output_dir your_output_dir to set the directory output (by default ./output/) ./fastIR_x64.exe --profile your_file_profile to specify a profile
Common questions about FastIR Collector including features, pricing, alternatives, and user reviews.
FastIR Collector is Tool for live forensics acquisition on Windows systems, collecting artefacts for early compromise detection. It is a Security Operations solution designed to help security teams with Windows Forensics.
FastIR Collector is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/SekoiaLab/Fastir_Collector/ for download and installation instructions.
Popular alternatives to FastIR Collector include:
Compare all FastIR Collector alternatives at https://cybersectools.com/alternatives/fastir-collector
FastIR Collector is for security teams and organizations that need Windows Forensics. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
Standalone DFIR data collector for Windows systems with adaptive collection
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A set of scripts for collecting forensic data from Windows and Unix systems respecting the order of volatility.