ForensicMiner, a PowerShell-based DFIR automation tool, revolutionizes the field of digital investigations. Designed for efficiency, it automates artifact and evidence collection from Windows machines. Compatibility with Flacon Crowdstrike RTR and Palo Alto Cortex XDR Live Terminal, along with its swift performance and user-friendly interface, makes ForensicMiner an indispensable asset for investigators navigating the complexities of forensic analysis. Streamlined and effective, this tool sets a new standard in the realm of digital forensics.
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/e163abfe-0a60-4181-806a-2426cbe26711
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/c0be8264-fc0f-47fc-83ad-fe3e5edf5056
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/397f3e3c-d271-4fd3-8ed5-2072a28d1395
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/0f32bc7c-b4fe-4ac5-88cb-09ea701878bd
After installing ForensicMiner on the machine using the execution of "FM-Extractor.ps1"
A new folder should be created on the "C:\" drive, called "ForensicMiner".
Navigate to This folder using the following command:
PS C:\> cd ForensicMiner
And now you can execute ForensicMiner menu page to view all available features and options using this command:
PS C:\ForensicMiner> .\ForensicMiner.ps1 -O Menu
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/163c6656-cc14-439c-bc7a-f775d175dd73
In this example you will see how ForensicMiner manage to collect all the Run.exe execution history
of all the users (Online or Offline) in the machine and log them under "C:\ForensicMiner\MyEvidence"
https://github.com/YosfanEilay/ForensicMiner/assets/132997318/043674b4-20ca-45e2-9ca6-f2218350862a
Name | Why is the credit ? |
---|---|
Ido Naor, Security Joes CEO | For supporting this project |
Warren Frame (RamblingCookieMonster) | Using Warre's PSSQLite in ForensicMiner |
Jan Moronia & Felipe Duarte | Helping to manage time spent on this project |
Nir Avron | For letting me test on his machine |