ForensicMiner v1.4 is a PowerShell-based digital forensics and incident response (DFIR) automation tool designed for Windows environments. The tool automates the collection of artifacts and evidence from Windows machines during digital investigations. It integrates with enterprise security platforms including Falcon CrowdStrike RTR and Palo Alto Cortex XDR Live Terminal. ForensicMiner requires installation on the C: drive and must be run with administrator privileges. The tool operates through PowerShell with execution policy set to Bypass to ensure proper script functionality. The application provides investigators with automated evidence collection capabilities, reducing manual effort in forensic analysis workflows. It is specifically designed for Windows-based digital forensic investigations and incident response scenarios.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
Exterro is a data risk management platform that optimizes e-discovery, digital forensics, and cybersecurity compliance operations.
TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.