Python-Based DFIR Report Generator • Neon Forensic UI Theme • Built by Arnab Das
Need the acquisition tool to collect Windows registry artifacts?
This is the companion evidence collection tool required before running the analysis engine.
RegEx-Analysis is the companion project to the RegEx Portable Registry Acquisition Tool.
This engine takes the collected forensic artifacts, parses the metadata, and automatically generates an interactive neon-themed HTML forensic report.
✔ No installation required
✔ Works on any PC (Windows, Linux, macOS)
✔ Uses only Python + Jinja2
✔ Fully portable for DFIR workflows
- 🟦 Generates a full interactive HTML forensic report (dark neon theme)
- 🟩 Parses manifest.json, usb_history.csv, regex_log.txt
- 🟣 Displays registry hives, hashes, artifacts, and extraction status
- 🟧 USB device history reconstruction (USBSTOR metadata)
- 🔵 Searchable + scrollable Evidence Table
- 🔴 OK/FAIL status badges
- 🟡 Automatic folder detection (no hard-coded paths)
RegEx-Analysis/
│
├── generate_report.py
├── README.md
├── LICENSE
│
├── templates/
│ ├── report_template.html
│ ├── report_style.css
│ └── regex_logo.png
│
│
├── evidence/
│ └── .gitignore
│
├── output/
│ └── RegEx_Report.html (auto-generated)
│
└── docs/
├── overview.md
├── workflow.md
└── requirements.md
pip install jinja2Or use:
pip install -r requirements.txt✔ Python 3.8+
✔ Works offline
✔ No admin rights needed
- Place your RegEx evidence folder under:
RegEx-Analysis/evidence/XX-XXXX-001/
- Run the report generator:
python generate_report.py- Your final interactive report is generated at:
RegEx-Analysis/output/RegEx_Report.html
- Open the HTML file in any browser.
The report contains:
- Case ID
- Operator
- Acquisition mode
- Total evidence
- Manifest hash
- Key summary
Lists:
- Device paths
- Serial numbers
- Models
- Connection events
- Searchable filter
- OK/FAIL badges
- SHA256 hashes
- Source categories
- Full acquisition logs
- Time-stamped errors
- VSS fallback notes
See the /output/ folder for sample reports.
Arnab Das
Master’s Student — Cyber Forensics
National Forensic Sciences University
This project is licensed under the MIT License.
Feel free to fork, modify, and contribute.
⚡ Part of the RegEx Forensic Analysis Suite • Built for DFIR • Made with ❤️ & Python ⚡
