A Windows Batch and Unix Bash script suite for comprehensive host forensic data collection during incident response.
ir-rescue is a forensic data collection toolkit consisting of a Windows Batch script (ir-rescue-win) and a Unix Bash script (ir-rescue-nix) designed for incident response. It comprehensively gathers live and historical host data—such as memory dumps, filesystem artifacts, network information, and malware indicators—from both Windows and Unix systems. The tool helps security analysts collect evidence efficiently during investigations, especially when remote access or live analysis isn't feasible.
Incident response and forensic analysts, security practitioners, and corporate security teams who need to perform standardized host data acquisitions during security incidents. It's also suitable for organizations that require a consistent forensic collection process across Windows and Unix environments.
Developers choose ir-rescue because it provides a unified, cross-platform approach to forensic data collection with minimal setup, leveraging well-known third-party tools. Its configuration-driven design allows customization of data types collected, and its awareness of forensic footprints ensures analysts understand the tool's impact on the system being investigated.
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Provides separate Windows Batch and Unix Bash scripts that ensure consistent forensic data collection across mixed OS environments, reducing dependency on on-site support as highlighted in the project philosophy.
Collects data in order of volatility to preserve evidence integrity, a critical feature for incident response timelines emphasized in the README's design principles.
Leverages trusted forensic utilities like Sysinternals, NirSoft, and YARA for specialized data acquisition, though some require manual setup due to licensing restrictions mentioned in the dependencies section.
Allows customization via a simple configuration file to enable or disable specific data types (e.g., malware, network), making it adaptable to different investigation needs without script modification.
Executes numerous commands and tools, leaving significant artifacts like prefetch files and memory strings as admitted in the README, which can alter system state and compromise forensic purity.
Users must manually download and place Sysinternals tools due to redistribution restrictions, adding setup complexity and potential licensing hurdles that are explicitly noted in the dependencies section.
Memory dumps (often 8 GB) and secure deletion operations can be slow on systems with poor disk performance, as the README warns that runtime varies considerably based on disk write throughput.