/Packrat

Live system forensic collector

Primary LanguageGoMIT LicenseMIT

CircleCI codecov Go Report Card GoDoc contributions welcome

Packrat

Packrat is a forensic collector geared towards augmenting EDR toolsets. Unfortunately, not all EDR toolsets have the capability of collecting forensically relevant files from endpoints. The GoFor Collector looks to remedy that.

Usage

   
Flags:
  --help                         Show context-sensitive help (also try
                                 --help-long and --help-man).
  --debug                        Enable debug mode.
  --all                          Collect all forensic artifacts.
  --mft                          Collect the system drive MFT.
  --mft-all                      Collect all attached volume MFTs.
  --mft-letters=MFT-LETTERS ...  Collect volume MFTs by volume letter.
  --reg                          Collect all registry hives, both system and
                                 user hives.
  --events                       Collect all event logs.
  --browser                      Collect browser history
  --custom-config=CUSTOM-CONFIG  Custom configuration file that will overwrite
                                 built in config.
  --throttle                     This setting will limit the process to a single
                                 thread. This will reduce the CPU load.
  --output=OUTPUT                Specify the name of the output file. If not
                                 specified, the file name defaults to the host
                                 name and a timestamp.

Examples

Collect all the things: forensic-collector.exe --all

Collect just the system drive MFT and export to a custom name zip file: forensic-collector.exe --mft --output out.zip

Collect event logs and registry hives: forensic-collector.exe --events --reg

Use a custom configuration for collection (see example config in config/config.yml): forensic-collector.exe --custom-config config.yml