Kali Linux

RecoverPy : Interactively Find And Recover Deleted Or Overwritten Files From Your Terminal

RecoverPy searches through every block of your partition to find your request. You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files.

Installation

 RecoverPy is currently only available on Linux systems.

Dependancies

Mandatory: To list and search through your partitions, recoverpy uses grepdd, and lsblk commands.

Optional: To display real time grep progress, you can install progress.

To install all dependencies:

  • Debian-like: apt install grep coreutils util-linux progress
  • Arch: pacman -S grep coreutils util-linux progress
  • Fedora: dnf install grep coreutils util-linux progress

Installation from pip

python3 -m pip install recoverpy

Usage

python3 -m recoverpy

If you are not logged as root use sudo recoverpy or log in with su - before execution.


 Select the system partition in which your file was. If you are out of luck, you can alternatively search in your home partition, maybe your IDE, text editor, etc. made a backup at some point.

 Type a text string to search. See tips below for better results.

Note that searching a string in a whole partition may take a while. (see euphemism)

Default save path is /tmp/, click on Settings to edit configuration.

 Start search, Results will appear in the left-hand box.

 Select a result to display the corresponding partition block content in the right-hand box.

 Once you have found your precious, select Save.

 You can now either save this block individually or explore neighboring blocks for the remaining parts of the file. You could then save it all in one file.

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

5 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

5 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

6 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

7 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

1 week ago