bulk_extractor
๐ฌ Digital Forensics ยท C++
bulk_extractor is a high-performance digital forensics tool that scans disk images, files, or directories and extracts useful information without parsing the file system or file system structures. It finds email addresses, URLs, credit card numbers, JPEG images, JSON fragments, GPS coordinates, Windows registry fragments, AES keys, and other artifacts by scanning raw data. This approach means it can recover data from unallocated space, slack space, compressed archives, and even encrypted volumes where the key is present in memory. bulk_extractor operates on the raw bytes of the input, dividing it into pages that are processed in parallel across all available CPU cores, making it extremely fast - often 10x faster than other carving tools. Its output consists of feature files that can be analyzed with tools like the included bulk_diff utility or imported into other analysis platforms.
Installation
apt (Debian/Ubuntu)
$ sudo apt install bulk-extractorbrew (macOS)
$ brew install bulk_extractorfrom source
$ git clone https://github.com/simsong/bulk_extractor && cd bulk_extractor && ./configure && make && sudo make installUse Cases
- Extracting email addresses, URLs, and credit card numbers from disk images
- Recovering data from unallocated space and slack space in forensic images
- Processing large disk images quickly with parallel multi-core scanning
- Finding encryption keys and passwords in memory dumps
- Comparing two forensic images with bulk_diff to identify changes over time
Tags
Details
- Category
- ๐ฌ Digital Forensics
- Language
- C++
- Repository
- simsong/bulk_extractor
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Alternatives & Comparisons
Volatility 3
PythonAdvanced memory forensics framework. Extracts artifacts from RAM dumps - processes, network connections, registry.
Compare bulk_extractor vs Volatility 3Autopsy
JavaDigital forensics platform with GUI. Disk image analysis, timeline analysis, keyword search, hash filtering.
Compare bulk_extractor vs AutopsyMore in Digital Forensics
Volatility 3
PythonAdvanced memory forensics framework. Extracts artifacts from RAM dumps - processes, network connections, registry.
Autopsy
JavaDigital forensics platform with GUI. Disk image analysis, timeline analysis, keyword search, hash filtering.
Ghidra
JavaNSA's reverse engineering framework. Disassembly, decompilation, graphing, and scripting for binary analysis.
Binwalk
PythonFirmware analysis tool. Searches binary images for embedded files, executables, and file systems.
YARA
CPattern matching swiss knife for malware researchers. Create rules to identify and classify malware samples.
Velociraptor
GoEndpoint visibility and collection tool. Hunt for artifacts across thousands of endpoints simultaneously.