Skip to content
Extract common Windows artifacts from source images and VSCs
Python
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.gitattributes
.gitignore
LICENSE
README.md Updated README.md and requirements.txt Mar 9, 2019
artifact_extractor.py
artifact_extractor.spec Added .spec file for pyinstaller Mar 9, 2019
artifact_selector.py Formatted code Jul 7, 2019
artifacts.py Added support for more artifacts Jul 6, 2019
requirements.txt Updated README.md and requirements.txt Mar 9, 2019
setup.py
vsm.py

README.md

ArtifactExtractor

ArtifactExtractor is a script that extracts common Windows artifacts from source images and VSCs.

Artifacts in VSCs will be checked (via hash) if they are different from a later VSC/image copy before extraction.

Dependencies

None if using release executable on Windows.

Else:

  1. Install backports.lzma
    • Windows: Use latest wheel file available from here
    • Linux: Use a package manager, e.g. sudo apt install liblzma-dev
  2. Install libewf
  3. (Windows ONLY) Install pywin32: pip install pywin32
  4. Install remaining requirements: use requirements.txt
    • Use pip: pip install -r requirements.txt

Usage

  1. Create destination directory
  2. artifact_extractor.exe <source image> <dest dir> [-a <selected artifacts>] or artifact_extractor.exe -h for more options

Credits

Joachim Metz and his libraries

John Corcoran for Unix Compatibility

You can’t perform that action at this time.