ir-rescue is composed of two sister scripts that collect a myriad of forensic data from 32-bit and 64-bit Windows systems (ir-rescue-win) and from Unix systems (ir-rescue-nix). The scripts respect the order of volatility and artifacts that are changed with the execution (e.g., prefetch files on Windows) and are intended for incident response use at different stages in the analysis and investigation process. ir-rescue-win is fully written in Batch and can be set to perform comprehensive and customized acquisitions of specific types of live data and of historical data from available Volume Shadow Copy Service (VSS) copies. ir-rescue-win makes use of built-in Windows commands and well-known third party utilities from Sysinternals and NirSoft, for instance, some being open-source. PowerShell and the Windows Management Instrumentation (WMI) are not used in order to make ir-rescue-win transversally compatible. ir-rescue-nix is written in Bash (v4+) and makes use of built-in Unix commands. Some commands used might not be POSIX-compliant and therefore might not be available on some Unix-like systems or variants, especially on older operating systems.
Common questions about ir-rescue including features, pricing, alternatives, and user reviews.
ir-rescue is A set of scripts for collecting forensic data from Windows and Unix systems respecting the order of volatility. It is a Security Operations solution designed to help security teams with Windows Forensics.
ir-rescue is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/diogo-fernan/ir-rescue/ for download and installation instructions.
Popular alternatives to ir-rescue include:
Compare all ir-rescue alternatives at https://cybersectools.com/alternatives/ir-rescue
ir-rescue is for security teams and organizations that need Windows Forensics. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
Standalone DFIR data collector for Windows systems with adaptive collection
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
Tool for live forensics acquisition on Windows systems, collecting artefacts for early compromise detection.