
A PowerShell-based DFIR automation tool that streamlines artifact and evidence collection from Windows machines for digital forensic investigations.

A PowerShell-based DFIR automation tool that streamlines artifact and evidence collection from Windows machines for digital forensic investigations.
ForensicMiner v1.4 is a PowerShell-based digital forensics and incident response (DFIR) automation tool designed for Windows environments. The tool automates the collection of artifacts and evidence from Windows machines during digital investigations. It integrates with enterprise security platforms including Falcon CrowdStrike RTR and Palo Alto Cortex XDR Live Terminal. ForensicMiner requires installation on the C: drive and must be run with administrator privileges. The tool operates through PowerShell with execution policy set to Bypass to ensure proper script functionality. The application provides investigators with automated evidence collection capabilities, reducing manual effort in forensic analysis workflows. It is specifically designed for Windows-based digital forensic investigations and incident response scenarios.
Common questions about ForensicMiner v1.4 including features, pricing, alternatives, and user reviews.
ForensicMiner v1.4 is A PowerShell-based DFIR automation tool that streamlines artifact and evidence collection from Windows machines for digital forensic investigations. It is a Security Operations solution designed to help security teams with Windows, Windows Forensics, Evidence Collection.
Standalone DFIR data collector for Windows systems with adaptive collection
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A digital forensics tool that extracts and analyzes Windows AppCompat and AmCache registry data for enterprise-scale forensic investigations.