DISKOVERY is a Python-based digital forensics tool designed to analyze disk images. It performs a multi-stage forensic analysis including imaging, partition parsing, file categorization, keyword-based filtering, and automatic PDF reporting. The tool supports both complete and filtered analysis outputs and provides investigators with a concise overview of disk contents. It is a command-line interface (CLI) tool that works well on Ubuntu and Debian-based systems.
- Disk Image Support (
.img
,.E01
,.dd
) - Partition Parsing using
mmls
- File Categorization:
- Deleted
- Encrypted
- Current
- Hidden
- File Type Filtering (e.g.,
.pdf
,.docx
) - Keyword Search in extracted text-based files
- Visual Summary via pie charts
- PDF Report Generation with listings, and visualizations
diskovery/
├── diskovery/ # Main package
│ ├── __init__.py
│ ├── main.py # CLI entry point
│ ├── stages/ # Stage-wise modular pipeline
│ │ ├── __init__.py
│ │ ├── stage1_disk_imaging.py
│ │ ├── stage2_extraction.py
│ │ ├── stage3_categorization.py
│ │ ├── stage4_filtering.py
│ │ ├── stage4_2_keyword.py
│ │ └── stage5_reporting.py
│ └── utils/ # Utility functions
│ ├── __init__.py
│ └── run_command.py
│
├── README.md # Project overview and usage
├── LICENSE # MIT License
├── setup.py # Packaging configuration
├── requirements.txt # Python dependencies
├── MANIFEST.in # Include non-code files for PyPI
├── pyproject.toml # Build configuration
└── .gitignore # Git ignore rules
pip install diskovery
Then run the tool globally from anywhere:
diskovery
git clone https://github.com/simmithapad/DISKOVERY.git
cd DISKOVERY
python3 -m venv .venv
source .venv/bin/activate
pip install -r requirements.txt
sudo apt update && sudo apt install -y dcfldd sleuthkit binwalk grep pdfgrep
python3 diskovery/main.py
- Insert your USB device.
- Check where it's mounted:
sudo fdisk -l

- Run DISKOVERY (choose one):
- If installed via pip:
sudo diskovery
- If running from source:
sudo python3 diskovery/main.py

dcfldd
sleuthkit
(formmls
,fls
,fsstat
)binwalk
grep
andpdfgrep
fpdf
docx2txt
re
- Disk images saved in
./output_files/
- PDF reports saved in
./output_files/reports/
- Extracted files saved in
./output_files/extracted_files/
- GPU Acceleration
- Memory Forensics Integration
Simmi Thapad
Vrinda Abrol
Vrinda Diwakar
Ankita Ghosh
This project is licensed under the MIT License - see the LICENSE file for details.
Important
This tool is intended for educational and lawful forensic analysis only. Use responsibly.