Digital forensics should be powerful, portable, and panic-free.
SUDARSHAN is designed as a command-line, interactive, case-driven forensic framework — an Autopsy GUI alternative without the bloat.
- One command. One interface. Infinite possibilities.
- Modular design for every phase of an investigation.
- Built entirely in Bash for maximum transparency and portability.
⚡ Think of it as a forensic Swiss Army knife — compact, sharp, and reliable.
✅ Single Entry Point → Everything runs from main.sh
✅ Fully Interactive → No commands to memorize; guided menus like a GUI
✅ Case Management → Organized, professional workflow
✅ 12 Core Modules → Imaging, Malware, Memory, Network, Reporting & more
✅ Reports in Markdown → Easy to convert to HTML/PDF
✅ Lightweight & Transparent → No dependencies beyond standard tools
✅ Autopsy Replacement → Same logic, CLI speed
SUDARSHAN/
│── cases/ # Case data storage
│
├── core/ # Core engine
│ ├── case_manager.sh # Manage forensic cases
│ ├── logging.sh # Unified logging
│ └── ui.sh # Interactive UI engine
│
├── modules/ # Independent forensic modules
│ ├── 01_imaging.sh # Disk imaging
│ ├── 02_fs_analysis.sh # File system analysis
│ ├── 03_carving.sh # Data carving
│ ├── 04_hashing.sh # Hash verification
│ ├── 05_keyword.sh # Keyword search
│ ├── 06_timeline.sh # Timeline generation
│ ├── 07_artifacts.sh # Artifact extraction
│ ├── 08_malware.sh # Malware analysis
│ ├── 09_memory.sh # Memory forensics
│ ├── 10_network.sh # Network forensics
│ ├── 11_cloud_mobile.sh # Cloud & mobile forensics
│ └── 12_reporting.sh # Automated report generation
│
├── reports/ # Case reports
│
├── LICENSE
├── main.sh # 🚀 Master launcher
└── README.md1️⃣ Clone the repository
git clone https://github.com/0warn/SUDARSHAN.git
cd SUDARSHAN2️⃣ Set permissions
chmod +x main.sh3️⃣ Launch the framework
./main.sh💡 From here, you’ll enter a menu-driven interactive mode that guides you through:
- Case setup & management
- Disk imaging & file system analysis
- Malware, memory, and network forensics
- Artifact discovery
- Automated reporting
╔════════════════════════════════════════════════════════════════════╗
║ 🚀 SUDARSHAN FORENSIC FRAMEWORK v6.0 ║
╠════════════════════════════════════════════════════════════════════╣
<<- CASE: 001 | MODULES: 12 | USER: groot ->>
╠════════════════════════════════════════════════════════════════════╣
║ [1 ] 01_imaging – Acquire forensic disk images ║
║ [2 ] 02_fs_analysis – No description available ║
║ [3 ] 03_carving – Recover deleted or hidden files ║
║ [4 ] 04_hashing – Generate & verify cryptographic hashes ║
║ [5 ] 05_keyword – Search keywords, regex, and IOC patterns ║
║ [6 ] 06_timeline – Build forensic activity timelines ║
║ [7 ] 07_artifacts – Extract OS, user, and browser artifacts ║
║ [8 ] 08_malware – Static & dynamic malware triage ║
║ [9 ] 09_memory – RAM dump analysis (Volatility, YARA) ║
║ [10] 10_network – PCAP/network traffic analysis ║
║ [11] 11_cloud_mobile – No description available ║
║ [12] 12_reporting – Export structured forensic reports ║
╠════════════════════════════════════════════════════════════════════╣
║ [H] Help [L] Logs [C] Switch Case [99] Exit ║
╚════════════════════════════════════════════════════════════════════╝
(SUDARSHAN)>
This project is licensed under the MIT License.
Built with precision by CODE
