The Ultimate Forensic Investigation Suite
Professional disk & memory forensics tool with AI-powered analysis, beautiful HTML reports, and CTF-optimized workflows.
- 22 specialized profiles for Windows & Linux memory analysis
- Powered by Volatility 3 with smart auto-detection
- CTF competition mode with auto flag detection
- APT hunting, ransomware detection, malware analysis
- 18 specialized profiles for filesystem analysis
- Smart filesystem detection - auto-detects NTFS, EXT4, FAT32, etc.
- Interactive HTML reports with file download buttons
- Credential extraction, deleted file recovery, timeline generation
- Natural language forensic commands
- OpenRouter & DeepSeek API support
- AI-powered evidence analysis
- Beautiful interactive HTML reports
- Download files directly from browser
- Search & filter capabilities
- Export to JSON, CSV, timeline formats
# Clone the repository
git clone https://github.com/arazazi/unfold.git
cd unfold
# Run setup (creates directories, installs profiles)
chmod +x DEPLOY.sh
./DEPLOY.sh
# Check dependencies
python3 unfoldV3.py --check-deps# Memory Analysis (Windows)
python3 unfoldV3.py memory.dmp --scan triage --html -o report.html
# Disk Analysis (any filesystem)
python3 unfoldV3.py disk.dd --scan-disk ctf --html -o disk_report.html
# Extract file from disk
python3 unfoldV3.py disk.dd --extract /path/to/file.txt -o output.txt
# Traditional modes
python3 unfoldV3.py disk.dd --json -o filesystem.json
python3 unfoldV3.py disk.dd --creds -o credentials.json| Profile | Speed | Description |
|---|---|---|
minimal |
30s | Quick system overview |
triage |
2-5m | Incident response essentials |
malware |
5-10m | Deep malware detection |
ctf_windows |
2-5m | CTF flag hunting (Windows) |
ctf_linux |
2-5m | CTF flag hunting (Linux) |
apt_hunting |
10-15m | Advanced persistent threats |
ransomware |
5-10m | Ransomware indicators |
full |
10-30m | Comprehensive analysis |
22 total profiles available - View all β
| Profile | Speed | Description |
|---|---|---|
triage |
2-5m | Quick filesystem overview |
ctf |
3-5m | CTF flag hunting with auto-detection |
credentials |
3-5m | Password & key extraction |
malware |
5-10m | Suspicious file detection |
browser |
2-3m | Browser artifacts & history |
deleted |
10-20m | Deleted file recovery |
timeline |
15-30m | Complete MAC timeline |
18 total profiles available - View all β
# Auto-detect flags in memory
python3 unfoldV3.py ctf.dmp --scan ctf_windows --html -o flags.html
# Auto-detect flags in disk
python3 unfoldV3.py ctf.dd --scan-disk ctf --html -o disk_flags.html
# Automatically searches for: CTF{}, FLAG{}, HTB{}, MD5, SHA1, SHA256# Quick triage
python3 unfoldV3.py suspect.dmp --scan triage --html -o triage.html
# Hunt for persistence
python3 unfoldV3.py disk.dd --scan-disk persistence --html -o backdoors.html
# Extract credentials
python3 unfoldV3.py disk.dd --scan-disk credentials --html -o creds.html# Generate complete timeline
python3 unfoldV3.py evidence.dd --scan-disk timeline --timeline -o timeline.bodyfile
# Browser forensics
python3 unfoldV3.py disk.dd --scan-disk browser --html -o browser.html
# Document recovery
python3 unfoldV3.py disk.dd --scan-disk documents --html -o docs.htmlDisk scan reports include clickable download buttons for files:
python3 unfoldV3.py disk.dd --scan-disk ctf --html -o report.html
# Open report.html in browser
# Click any "Download" button to extract files instantly!# Natural language commands
python3 unfoldV3.py memory.dmp \
-p "find all suspicious processes and their network connections" \
-ai openrouter --html -o ai_analysis.html- Python 3.8+
- pytsk3 - Disk analysis
- Volatility 3 - Memory analysis (included)
- pyewf - E01 image support (optional)
- openai - AI features (optional)
pip install pytsk3 --break-system-packages
pip install pyewf openai --break-system-packages # Optionalunfold/
βββ unfold.py # Main script
βββ DEPLOY.sh # One-click installer
βββ config.example.json # Example config (no real keys)
βββ scans/ # Scan profile definitions
β βββ unified_scan_profiles.json
β βββ disk_scan_profiles.json
βββ report-template/ # HTML templates
β βββ report.html
βββ Documentation.md # Complete user guide
βββ README.md # This file
Contributions welcome! Please:
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Open a Pull Request
MIT License - see LICENSE file for details.
- Volatility Foundation - Memory forensics framework
- The Sleuth Kit - Filesystem analysis tools
- OpenAI & Anthropic - AI integration
Built with β€οΈ for forensic investigators, CTF players, and security researchers