Skip to content
/ unfold Public

πŸ•΅οΈ An AI-powered forensic orchestration engine for automated disk and memory analysis. Bridges the gap between raw data and actionable intelligence using LLMs (DeepSeek/OpenRouter).

Notifications You must be signed in to change notification settings

arazazi/unfold

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

28 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

image

πŸ” UNFOLD v3.0 ULTRA

The Ultimate Forensic Investigation Suite
Professional disk & memory forensics tool with AI-powered analysis, beautiful HTML reports, and CTF-optimized workflows.

Version Python Platform License


✨ Features

🧠 Memory Forensics

  • 22 specialized profiles for Windows & Linux memory analysis
  • Powered by Volatility 3 with smart auto-detection
  • CTF competition mode with auto flag detection
  • APT hunting, ransomware detection, malware analysis

πŸ’Ύ Disk Forensics

  • 18 specialized profiles for filesystem analysis
  • Smart filesystem detection - auto-detects NTFS, EXT4, FAT32, etc.
  • Interactive HTML reports with file download buttons
  • Credential extraction, deleted file recovery, timeline generation

πŸ€– AI Integration

  • Natural language forensic commands
  • OpenRouter & DeepSeek API support
  • AI-powered evidence analysis

πŸ“Š Professional Reports

  • Beautiful interactive HTML reports
  • Download files directly from browser
  • Search & filter capabilities
  • Export to JSON, CSV, timeline formats

πŸš€ Quick Start

Installation

# Clone the repository
git clone https://github.com/arazazi/unfold.git
cd unfold

# Run setup (creates directories, installs profiles)
chmod +x DEPLOY.sh
./DEPLOY.sh

# Check dependencies
python3 unfoldV3.py --check-deps

Basic Usage

# Memory Analysis (Windows)
python3 unfoldV3.py memory.dmp --scan triage --html -o report.html

# Disk Analysis (any filesystem)
python3 unfoldV3.py disk.dd --scan-disk ctf --html -o disk_report.html

# Extract file from disk
python3 unfoldV3.py disk.dd --extract /path/to/file.txt -o output.txt

# Traditional modes
python3 unfoldV3.py disk.dd --json -o filesystem.json
python3 unfoldV3.py disk.dd --creds -o credentials.json

🎯 Scan Profiles

Memory Scans (--scan)

Profile Speed Description
minimal 30s Quick system overview
triage 2-5m Incident response essentials
malware 5-10m Deep malware detection
ctf_windows 2-5m CTF flag hunting (Windows)
ctf_linux 2-5m CTF flag hunting (Linux)
apt_hunting 10-15m Advanced persistent threats
ransomware 5-10m Ransomware indicators
full 10-30m Comprehensive analysis

22 total profiles available - View all β†’

Disk Scans (--scan-disk)

Profile Speed Description
triage 2-5m Quick filesystem overview
ctf 3-5m CTF flag hunting with auto-detection
credentials 3-5m Password & key extraction
malware 5-10m Suspicious file detection
browser 2-3m Browser artifacts & history
deleted 10-20m Deleted file recovery
timeline 15-30m Complete MAC timeline

18 total profiles available - View all β†’


πŸ’‘ Use Cases

πŸ† CTF Competitions

# Auto-detect flags in memory
python3 unfoldV3.py ctf.dmp --scan ctf_windows --html -o flags.html

# Auto-detect flags in disk
python3 unfoldV3.py ctf.dd --scan-disk ctf --html -o disk_flags.html

# Automatically searches for: CTF{}, FLAG{}, HTB{}, MD5, SHA1, SHA256

πŸ” Incident Response

# Quick triage
python3 unfoldV3.py suspect.dmp --scan triage --html -o triage.html

# Hunt for persistence
python3 unfoldV3.py disk.dd --scan-disk persistence --html -o backdoors.html

# Extract credentials
python3 unfoldV3.py disk.dd --scan-disk credentials --html -o creds.html

πŸ•΅οΈ Digital Forensics

# Generate complete timeline
python3 unfoldV3.py evidence.dd --scan-disk timeline --timeline -o timeline.bodyfile

# Browser forensics
python3 unfoldV3.py disk.dd --scan-disk browser --html -o browser.html

# Document recovery
python3 unfoldV3.py disk.dd --scan-disk documents --html -o docs.html

πŸ› οΈ Advanced Features

Interactive Reports with File Download

Disk scan reports include clickable download buttons for files:

python3 unfoldV3.py disk.dd --scan-disk ctf --html -o report.html
# Open report.html in browser
# Click any "Download" button to extract files instantly!

AI-Powered Analysis (Optional)

# Natural language commands
python3 unfoldV3.py memory.dmp \
  -p "find all suspicious processes and their network connections" \
  -ai openrouter --html -o ai_analysis.html

πŸ“‹ Requirements

  • Python 3.8+
  • pytsk3 - Disk analysis
  • Volatility 3 - Memory analysis (included)
  • pyewf - E01 image support (optional)
  • openai - AI features (optional)

Installation

pip install pytsk3 --break-system-packages
pip install pyewf openai --break-system-packages  # Optional

🎨 Project Structure

unfold/
β”œβ”€β”€ unfold.py                 # Main script
β”œβ”€β”€ DEPLOY.sh                   # One-click installer
β”œβ”€β”€ config.example.json         # Example config (no real keys)
β”œβ”€β”€ scans/                      # Scan profile definitions
β”‚   β”œβ”€β”€ unified_scan_profiles.json
β”‚   └── disk_scan_profiles.json
β”œβ”€β”€ report-template/            # HTML templates
β”‚   └── report.html
β”œβ”€β”€ Documentation.md            # Complete user guide
└── README.md                   # This file

🀝 Contributing

Contributions welcome! Please:

  1. Fork the repository
  2. Create a feature branch
  3. Commit your changes
  4. Push to the branch
  5. Open a Pull Request

πŸ“„ License

MIT License - see LICENSE file for details.


πŸ™ Acknowledgments

  • Volatility Foundation - Memory forensics framework
  • The Sleuth Kit - Filesystem analysis tools
  • OpenAI & Anthropic - AI integration

Built with ❀️ for forensic investigators, CTF players, and security researchers

About

πŸ•΅οΈ An AI-powered forensic orchestration engine for automated disk and memory analysis. Bridges the gap between raw data and actionable intelligence using LLMs (DeepSeek/OpenRouter).

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published