This guide provides step-by-step instructions to get started with ArteFact. Follow these steps for a complete setup with all features.
- Python 3.7 or higher
- Git
- Windows, Linux, or macOS
- (Optional) ExifTool for deep metadata extraction
- (Optional) Volatility3 for advanced memory analysis
git clone https://github.com/Rizzy1857/ArteFact.git
cd ArteFactCreate and activate a virtual environment:
python -m venv venv
.\venv\Scripts\activate # Windows
# source venv/bin/activate # Linux/macOSInstall core dependencies:
pip install -r requirements.txtOptional features (recommended):
pip install -r requirements-opt.txtDevelopment tools (for contributors):
pip install -r requirements-dev.txtchoco install exiftool volatility3sudo apt install exiftool volatility3Check core functionality:
artefact --version
artefact --list-toolsRun the test suite:
pytest- Read the Usage Guide for detailed command reference
- Check Example Usage below for common scenarios
- Join our community on Discord
# Hash a file or directory
artefact hash file.txt --algorithm sha256
artefact hash ./evidence/ --recursive --json
# Extract metadata
artefact meta image.jpg --deep
artefact meta document.pdf --output report.json# Analyze a memory dump
artefact memory -i dump.raw --strings --iocs
artefact memory -i dump.raw --carve --output carved_files/
# Process listing and network connections
artefact memory -i dump.raw --pslist --netstat# Create a timeline from directory
artefact timeline ./evidence/ --format markdown
artefact timeline ./logs/ --output timeline.json# Collect system artifacts
artefact liveops --collect processes,network,registry
artefact liveops --monitor --duration 1hCommon issues and solutions:
- ImportError: DLL load failed: Install Visual C++ Redistributable
- Permission denied: Run with appropriate privileges
- Memory errors: Adjust Python heap size or use 64-bit Python
For more help:
# Hash a file
artefact hash test/text.txt --algorithm md5
# Carve files from a disk image
artefact carve -i disk.img -o output --types jpg
# Extract metadata
artefact meta -f sample.jpg --deep
# Generate a timeline
artefact timeline "C:\Users\HRISHI\Documents\*" --format markdown
# Mount a disk image (if supported)
artefact mount -i disk.img --list
# Analyze a memory dump (if volatility3 installed)
artefact memory -i memdump.raw --strings
# Collect live system info
artefact liveops --collect processes networkpytestFor more, see docs/usage.md and README.md.