DISKOVERY is a Python-based digital forensics tool designed to analyze disk images. It performs a multi-stage forensic analysis including imaging, partition parsing, file categorization, keyword-based filtering, and automatic PDF reporting. The tool supports both complete and filtered analysis outputs and provides investigators with a concise overview of disk contents. It is a command-line interface (CLI) tool that works well on Ubuntu and Debian-based systems.
- Disk Image Support (
.img,.E01,.dd) - Partition Parsing using
mmls - File Categorization:
- Deleted
- Encrypted
- Current
- Hidden
- File Type Filtering (e.g.,
.pdf,.docx) - Keyword Search in extracted text-based files
- Visual Summary via pie charts
- PDF Report Generation with listings, and visualizations
diskovery/
├── diskovery/ # Main package
│ ├── __init__.py
│ ├── main.py # CLI entry point
│ ├── stages/ # Stage-wise modular pipeline
│ │ ├── __init__.py
│ │ ├── stage1_disk_imaging.py
│ │ ├── stage2_extraction.py
│ │ ├── stage3_categorization.py
│ │ ├── stage4_filtering.py
│ │ ├── stage4_2_keyword.py
│ │ └── stage5_reporting.py
│ └── utils/ # Utility functions
│ ├── __init__.py
│ └── run_command.py
│
├── README.md # Project overview and usage
├── LICENSE # MIT License
├── setup.py # Packaging configuration
├── requirements.txt # Python dependencies
├── MANIFEST.in # Include non-code files for PyPI
├── pyproject.toml # Build configuration
└── .gitignore # Git ignore rules
pip install diskoveryThen run the tool globally from anywhere:
diskoverygit clone https://github.com/simmithapad/DISKOVERY.git
cd DISKOVERYpython3 -m venv .venv
source .venv/bin/activate
pip install -r requirements.txt
sudo apt update && sudo apt install -y dcfldd sleuthkit binwalk grep pdfgreppython3 diskovery/main.py- Insert your USB device.
- Check where it's mounted:
sudo fdisk -l
- Run DISKOVERY (choose one):
- If installed via pip:
sudo diskovery- If running from source:
sudo python3 diskovery/main.py
dcflddsleuthkit(formmls,fls,fsstat)binwalkgrepandpdfgrep
fpdfdocx2txtre
- Disk images saved in
./output_files/ - PDF reports saved in
./output_files/reports/ - Extracted files saved in
./output_files/extracted_files/
- GPU Acceleration
- Memory Forensics Integration
Simmi Thapad
Vrinda Abrol
Vrinda Diwakar
Ankita Ghosh
This project is licensed under the MIT License - see the LICENSE file for details.
Important
This tool is intended for educational and lawful forensic analysis only. Use responsibly.