4xrhd/IRkit
IR-Kit is a comprehensive bash-based incident response and forensic analysis tool designed for rapid evidence collection during cybersecurity incidents. This tool automates the process of gathering critical system artifacts for forensic investigation and generates detailed HTML reports with PDF export capability.
๐ IR-Kit - Incident Response & Forensic Toolkit
๐ Project Overview
IR-Kit is a comprehensive bash-based incident response and forensic analysis tool designed for rapid evidence collection during cybersecurity incidents. This tool automates the process of gathering critical system artifacts for forensic investigation and generates detailed HTML reports with PDF export capability.
๐ฏ Project Details
- University: [University Of Information Technology And Sciences(UITS)]
- Course: Linux Programming Lab
- Project Type: Bash Scripting & Digital Forensics
- Developed By: Md Azhar Uddin & Sadia Akter Liza
๐จโ๐ป Development Team
| Name | Role | Contribution |
|---|---|---|
| Md Azhar Uddin | Project Lead | Core architecture, module development, reporting system |
| Sadia Akter Liza | Co-developer | Evidence collection modules, utility functions,UX-UI, Testing |
๐ Features
๐ Evidence Collection Modules
- Process Analysis - Running processes and memory usage
- Network Information - Active connections, IP configuration, firewall rules
- User Account Analysis - User/group information, login history
- Storage Analysis - Mount points and block devices
- Shell History - User command history collection
- File System Analysis - Recently modified files
- Scheduled Tasks - Cron job analysis
- System Logs - Auth logs, system messages, syslog
- Suspicious Activity - SUID binaries, executable files in /tmp
๐ Reporting Features
- HTML Report Generation - Beautiful, responsive web report
- PDF Export - One-click export to PDF format
- Executive Summary - Key metrics and findings
- Integrity Verification - SHA-256 hashing of all evidence
- Interactive Interface - Modern UI with hover effects
๐ ๏ธ Installation & Setup
Prerequisites
# Ensure required tools are available
sudo apt-get update
sudo apt-get install coreutils findutils tar gzipInstallation Steps
-
Clone or Download the Project
git clone [https://github.com/4xrhd/IRkit] cd ir-kit -
Make Scripts Executable
chmod +x irkit.sh chmod +x generate_report.sh chmod +x modules/*.sh chmod +x utils.sh -
Review Configuration
nano config.conf
Adjust settings as needed:
MONITOR_PATH="/var /etc /home" LOOKBACK_MINUTES=240 HASH_ALGO=sha256sum COLOR_OUTPUT=true LOG_LEVEL=INFO
๐ฎ Usage
Basic Execution
./irkit.shExpected Output
[INFO] Starting IR-Kit โ output: /path/to/outputs/IRKIT_20231201_143022
[INFO] Running module: processes
[INFO] Running module: network
[INFO] Running module: users
...
[INFO] Generating HTML report
[INFO] Compressing evidence to outputs/IRKIT_20231201_143022.tar.gz
[INFO] IR-Kit completed. Archive: outputs/IRKIT_20231201_143022.tar.gz
[INFO] HTML Report: outputs/IRKIT_20231201_143022/report.html
Output Structure
outputs/
โโโ IRKIT_20231201_143022/
โโโ report.html # ๐ Main HTML report
โโโ EVIDENCE_SHA256.txt # ๐ Integrity hashes
โโโ running_processes.txt # โก Process information
โโโ network_connections.txt # ๐ Network data
โโโ passwd_entries.txt # ๐ฅ User accounts
โโโ mounts.txt # ๐พ Storage info
โโโ history_*.txt # ๐ Shell histories
โโโ modified_files_*.txt # ๐ File changes
โโโ user_cron.txt # โฐ Scheduled tasks
โโโ suid_binaries.txt # ๐จ Security findings
โโโ [other evidence files...]
๐ Module Details
1. Processes Module (processes.sh)
- Collects running processes sorted by memory usage
- Output:
running_processes.txt
2. Network Module (network.sh)
- Active network connections using
ssornetstat - IP configuration and firewall rules
- Output:
network_connections.txt,ip_brief.txt,firewall_rules.txt
3. Users Module (users.sh)
- User and group information from
/etc/passwdand/etc/group - Recent login history
- Output:
passwd_entries.txt,group_entries.txt,last_logins.txt
4. History Module (history.sh)
- Bash history for all users including root
- Output:
history_[username].txt,history_root.txt
5. Suspicious Activity Module (suspicious.sh)
- SUID binaries for privilege escalation analysis
- Executable files in temporary directories
- Output:
suid_binaries.txt,tmp_executables.txt
๐ Report Features
HTML Report Includes:
- Executive Summary with key metrics
- Collection Statistics (files collected, sizes, counts)
- Module Execution Status
- Evidence File Listing
- Key Findings Preview (top processes, recent logins)
- Integrity Verification (SHA-256 hashes)
- Professional Styling with responsive design
PDF Export:
- One-click export using html2pdf.js
- Print-optimized layout
- Professional formatting for reports
๐ง Configuration Options
config.conf Settings:
# Paths to monitor for modified files
MONITOR_PATH="/var /etc /home"
# Time window for file modifications (minutes)
LOOKBACK_MINUTES=240
# Hashing algorithm for integrity
HASH_ALGO=sha256sum
# Colored console output
COLOR_OUTPUT=true
# Logging verbosity
LOG_LEVEL=INFO๐ Educational Value
This project demonstrates:
- Bash Scripting advanced techniques
- Digital Forensics evidence collection
- Incident Response procedures
- System Administration commands
- HTML/CSS/JavaScript for reporting
- Cybersecurity best practices
๐ Academic Considerations
Learning Outcomes:
- Understand forensic evidence collection methodologies
- Implement automated incident response procedures
- Develop comprehensive reporting systems
- Practice secure coding and error handling
- Create user-friendly interfaces for technical tools
Potential Enhancements for Grading:
- Additional collection modules
- Enhanced error handling
- Database integration for evidence storage
- Timeline analysis features
- Integration with other forensic tools
โ ๏ธ Important Notes
Legal and Ethical Usage:
- Only use on systems you own or have explicit permission to test
- Comply with local laws and regulations
- Use responsibly in academic environments
Limitations:
- Requires root privileges for complete evidence collection
- Some modules may not work on all Linux distributions
- Designed for educational purposes
๐ Troubleshooting
Common Issues:
-
Permission Denied Errors
sudo ./irkit.sh
-
Missing Dependencies
# Ubuntu/Debian sudo apt-get install coreutils findutils net-tools -
Script Not Executable
chmod +x *.sh chmod +x modules/*.sh
๐ Support
For questions or issues related to this university project:
-
Contact: Md. Azhar Uddin & Sadia Akter Liza
-
Course Instructor: Md. Tasnin Tanvir ~ Lecturer(UITS)~ B.Sc in CSE, Khulna University of Engineering & Technology (KUET)
-
Course Instructor: Md. Azharul Karim Chowdhury Anik ~Lecturer ~B.Sc. (Engg.) in CSE, Shahjalal University of Science and Technology (SUST)
-
Submission Date: [18-November-2025]
๐ License
This project is developed for educational purposes as part of university coursework. All rights reserved by the developers.
๐ Developed for Academic Excellence in Linux Programming
Md Azhar Uddin & Sadia Akter Liza - [University Of Information Technology And Sciences] - [2025]