WindowsLiveForensicCollect is a PowerShell script designed for live forensic data collection on Windows systems. It allows incident responders and forensic analysts to gather crucial volatile and non-volatile data without altering the system state.
git clone https://github.com/MarcoAbreu2002/WindowsLiveForensicCollect.git
cd WindowsLiveForensicCollect
Run the main script and specify the destination folder:
./main.ps1
Choose the type of collection or select "Run All" to capture all available data.
Select an option:
1 - Collect Volatile Fragment Windows
2 - Collect Routing Table, ARP Cache, and Kernel Statistics
3 - Collect DNS Cache
4 - Collect Running Processes
5 - Collect Active Network Connections
6 - Collect Programs Using Network
7 - Collect Open Files
8 - Collect Network Shares
9 - Collect Open Ports
...
30 - Run All
31 - Exit
Files generated in the destination folder might include: