✨ Key Features

🔍

Registry Analysis

Comprehensive Windows Registry parser supporting multiple hive types:

  • SOFTWARE, SYSTEM, SAM, NTUSER.DAT
  • SECURITY, UsrClass.dat
  • Autorun extraction
  • USB device history

Prefetch Parsing

Parse Windows Prefetch files with full version support:

  • Windows XP through Windows 11
  • Compressed and uncompressed formats
  • Execution timestamps
  • Run count tracking
🔗

LNK File Analysis

Parse Windows shortcut files for forensic artifacts:

  • Target file information
  • Creation, modification, access times
  • Volume and network data
  • Command line arguments
📋

EVTX Parsing

Windows Event Log analysis with advanced features:

  • Event ID mapping
  • Timeline generation
  • Custom filters
  • CSV/JSON export
🧠

Memory Analysis

Volatility 3 integration for memory forensics:

  • Process listing and analysis
  • Network connections
  • DLL and handle enumeration
  • Cross-platform support

🚀 Installation

# Clone the repository
git clone https://github.com/Prof-GP/forensic-toolbox.git
cd forensic-toolbox

# Install dependencies
pip install -r requirements.txt

📖 Usage Examples

CLI Usage

# Parse a registry hive
python forensic_toolbox.py --registry SOFTWARE --output results.json

# Parse prefetch files
python forensic_toolbox.py --prefetch C:\Windows\Prefetch --output prefetch_results.csv

# Analyze LNK files
python forensic_toolbox.py --lnk shortcuts.lnk --verbose

# Parse EVTX logs
python forensic_toolbox.py --evtx Security.evtx --event-ids 4624,4625

# Memory analysis
python forensic_toolbox.py --memory memdump.raw --profile Win10x64

Python API

from forensic_toolbox import RegistryParser, PrefetchParser

# Registry analysis
parser = RegistryParser('SOFTWARE')
autorun_data = parser.get_autoruns()
usb_history = parser.get_usb_devices()

# Prefetch parsing
prefetch = PrefetchParser('CALC.EXE-3FBEF7FD.pf')
execution_info = prefetch.get_execution_info()

📁 Supported File Types

Registry Hives: SOFTWARE, SYSTEM, SAM, NTUSER.DAT, SECURITY, UsrClass.dat
Prefetch: .pf files (Windows XP - Windows 11)
Shortcuts: .lnk files
Event Logs: .evtx files
Memory Dumps: .raw, .mem, .dmp files

🤝 Contributing

Contributions are welcome! Feel free to submit issues, fork the repository, and create pull requests.