MFTExtractor Logo

MFTExtractor

0
Free
Visit Website

A Parser of Master File Table NTFS file system. Using this tool you can explore $MFT NTFS and its file system attributes. You can selectively extract filesystem information of record or for a range of records. In addition, you can export the contents of files. Exporting files can be achieved either by mounting the evidence and providing its physical drive order and partition number or by using the acquired forensic image (Expert Witness Format), or virtual machine disk format. Examples you can now explore NTFS by providing physical drive number and partition number e.g. -physicaldrive 0 -partition 1 translates to \.\

FEATURES

ALTERNATIVES

Open source tool for generating YARA rules about installed software from a running OS.

Automated collection tool for incident response triage in Windows systems.

Generate comprehensive reports about Windows systems with detailed system, security, networking, and USB information.

mac_apt is a versatile DFIR tool for processing Mac and iOS images, offering extensive artifact extraction capabilities and cross-platform support.

A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.

Python forensic tool for extracting and analyzing information from Firefox, Iceweasel, and Seamonkey browsers.

Tool for parsing NTFS journal files, $Logfile, and $MFT.

Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.

PINNED