MFT_Browser Logo

MFT_Browser

0
Free
Visit Website

Recreates the File/Directory tree structure from an (extracted) $MFT file. Supports both 1024 & 4096 byte long records. Able to carve FILE records & recreate a Directory tree from a Raw Image (v.60+). Able to extract the $MFT & recreate the Directory tree from a mounted NTFS volume (Volume must have a drive letter) (v.60+). Latest Version: [Dependencies] .NET Framework 4.8, Powershell Version: 5.1. 'Node Properties' right-click option or Double-clicking on any file/directory entry gets the full MFT details for that record. Clicking on any detail of the record shows the source of the detail in the Hex view grid. All timestamps are in UTC. Standalone GUI Calc for Dataruns: => MFT_dataruns. Note: Recreating the directory tree from large MFT files might take a lot of time (possibly hour(s)), as it needs to map each child record to its parent node, and as the structure grows, the time needed grows exponentially. $MFT Structures (pdf), Using MFTbrowser (pdf), How to view a single record from a large MFT file (pdf), Reparse point examples (pdf), Small test $MFT files to play with can be found on the provided links.

FEATURES

ALTERNATIVES

A command-line utility and Python package for mounting and unmounting various disk image formats with support for different volume systems and filesystems.

A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.

A bash script for automating Linux swap analysis for post-exploitation or forensics purposes.

A tool that uses Plaso to parse forensic artifacts and disk images, creating custom reports for easier analysis.

A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.

A digital investigation platform for parsing, searching, and visualizing evidences with advanced analytics capabilities.

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

A tool for discovering, analyzing, and remedying sensitive data