Welcome to Logicytics 🌐, a cutting-edge tool designed to meticulously harvest and collect a vast array of Windows system data for forensic analysis. Crafted with Python 🐍, it's an actively developed project that is aimed at gathering as much sensitive data as possible and packaging it neatly into a ZIP file 📦. This comprehensive guide is here to equip you with everything you need to use Logicytics effectively.
Please consider buying me a coffee or sponsoring me in GitHub sponsor, I am saving for my college funds in MIT, and I need your help! Supporters will be placed in the Credits ❤️
Ensure your system meets these requirements:
- Windows 10 or later.
- Administrative rights.
- Python installed (preferable version 3.11).
-
Clone the Repository: Use Git to clone Logicytics to your local machine. Open Command Prompt as an administrator and run:
git clone https://github.com/DefinetlyNotAI/Logicytics.git
-
Navigate to the Project Directory: Change your current directory to the cloned Logicytics folder:
cd Logicytics
-
Setup Logicytics: Navigate to the
SETUP
folder and run thesetup.py
script using the following command, This will install the required dependencies and create any necessary files for full functionality.pip install -e.
-
Run Logicytics: Navigate to the
CODE
folder and run./Logicytics.py
more info below.
-
CLI: The most preferred method, all in your command line! More feedback can be given, to use it just open
CMD
in theCODE
directory, and run./Logicytics.py
-
GUI: Still in beta, GUI is not recommended unless you are unfamiliar with CLI, the GUI automatically constructs your command and executes it from a basic window. To use this feature, go to the
CODE
directory and run theGUI.py
file, or type in the terminal./GUI.py
.
Logicytics offers extensive customization options through flags while running.
These flags allow you to:
- Specify which types of files to collect data.
- Exclude certain files/data from the data collection process.
- Adjust logging levels for detailed insights.
More info about the flags on the wiki.
Extend Logicytics' functionality by creating custom Python scripts.
Place these scripts in the CODE
directory.
Logicytics will automatically execute these scripts during the data collection process,
enabling tailored data extraction (When using the --mods
flag).
- Permission Denied: Ensure you're running Logicytics with administrative privileges.
- Incomplete Data Collection: Verify all necessary files and folders are intact and unmodified.
- Update Issues: Use the
--update
flag to fetch the latest version of Logicytics. - Recovery: Use the
--backup
and--restore
to keep a history of intact files in case of errors.
Consult the .md
log file in the ACCESS/LOGS
directory for detailed error logs.
Engage with the community through GitHub issues for assistance and feedback.
Once Logicytics has completed its data collection,
you'll find the results packaged neatly in a ZIP file within the ACCESS/DATA
directory.
This data can be analyzed using various tools and techniques, depending on your needs.
Whether you're conducting forensic investigations, auditing system health,
or analyzing performance metrics, Logicytics provides a solid foundation for your analysis.
By exploring the depths of Logicytics, you've gained a deeper understanding of its capabilities, configuration options, and advanced features. This tool is a powerful asset in your arsenal for system data analysis, offering flexibility, customization, and ease of use. Remember, the key to unlocking its full potential lies in experimentation and continuous learning. Happy data mining 🎯
This expanded guide aims to provide a thorough understanding of Logicytics, covering everything from installation and setup to advanced usage and troubleshooting. With this knowledge, you're well-equipped to utilize Logicytics to its fullest extent, enhancing your ability to analyze and understand system data.