CollectiFOR is a digital forensics and incident response (DFIR) toolkit to collect and analyze system and network artifacts from Linux based target machines. Supports file collection, disk acquisition, memory acquisition, network capture, checksum calculation, and analysis of indicators of compromise.
This repository is splitted in two main sections:
collect/:
- The main collect binary for triage collection and full disk captures.
- Other tools to support the data acquisition process.
See collect/README.md
(Remote collection: see ansible-collect)
analyze/:
- collectifor.py -> Data ingestion (collections collected with
collecttools and JSONL timeline ingestion), analysis tools (YARA, patterns, etc.), and web based viewer component (collection navigation, search, timeline explorer, etc.) - helpers/ -> Plaso, zeek, etc. docker container launch scripts, additional collectien analysis, etc.
- Modify collect/config.yaml.sample to match your data collection needs.
- Copy
collectbinary and config file to target machine(s). - Run collection on the target machine:
sudo ./collect -c ./config.yaml -if eth0- Move collection directory or tar.gz file to analysis machine
- Run collectiFOR
# Might require sudo/root depending on your collection's path and its contents permissions
cd analyze/
python3 -m venv venv
source venv/bin/activate
pip3 install -r requirements.txt
python3 collectifor.py -c config.yaml.sample --viewer --init --analysis --collection /collections/host_20251217_141749.tar.gz - Open 127.0.0.1:5000 in your browser and view collection and analysis data
- Collection:
collect/requirements.txt(not relevant when using released binary) - Analysis/Viewer:
analyze/requirements.txt - Optional (for memory acquisition):
- LiME kernel module
