bulk_extractor
TLDR
Extract data from disk image
SYNOPSIS
bulk_extractor [options] image
DESCRIPTION
bulk_extractor is a high-performance digital forensics tool that scans disk images, files, or directories and extracts structured information without parsing file system structures. It extracts email addresses, credit card numbers, URLs, and other artifacts.
The tool processes data in parallel across multiple CPU cores, making it significantly faster than traditional forensic tools.
PARAMETERS
-o directory
Output directory (required)-e scanner
Enable specific scanner-x scanner
Disable specific scanner-j threads
Number of threads to use-G bytes
Page size (default: 16777216)-M depth
Maximum recursion depth (default: 12)-R
Recursively scan directory-f pattern
Search for specific pattern-F file
Read patterns from file-Y start-end
Scan specific byte range-Z
Wipe output directory before starting-q
Quiet mode (no status output)-H
List available scanners with info
OUTPUT
Creates report.xml with Digital Forensics XML metadata about the run. Individual feature files contain extracted data types (emails.txt, ccn.txt, urls.txt, etc.).
CAVEATS
Output directory must not exist or use -Z to wipe. Processing large images requires significant disk space for output. Some scanners may produce false positives requiring manual review.


