MFTExtractor Logo

MFTExtractor

0
Free
Visit Website

A Parser of Master File Table NTFS file system. Using this tool you can explore $MFT NTFS and its file system attributes. You can selectively extract filesystem information of record or for a range of records. In addition, you can export the contents of files. Exporting files can be achieved either by mounting the evidence and providing its physical drive order and partition number or by using the acquired forensic image (Expert Witness Format), or virtual machine disk format. Examples you can now explore NTFS by providing physical drive number and partition number e.g. -physicaldrive 0 -partition 1 translates to \.\

FEATURES

ALTERNATIVES

Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.

dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.

A library to access and parse OLE 2 Compound File (OLECF) format files.

Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.

Collects and organizes Linux OS data for detailed analysis and incident response.

A command-line utility for extracting human-readable text from binary files.

iOSForensic is a Python tool for forensic analysis on iOS devices, extracting files, logs, SQLite3 databases, and .plist files into XML.

A Mac OS X computer forensics tool for analyzing system artifacts, user files, and logs with reputation verification and log aggregation capabilities.