Kali Linux

RecoverPy : Interactively Find And Recover Deleted Or Overwritten Files From Your Terminal

RecoverPy searches through every block of your partition to find your request. You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files.

Installation

 RecoverPy is currently only available on Linux systems.

Dependancies

Mandatory: To list and search through your partitions, recoverpy uses grepdd, and lsblk commands.

Optional: To display real time grep progress, you can install progress.

To install all dependencies:

  • Debian-like: apt install grep coreutils util-linux progress
  • Arch: pacman -S grep coreutils util-linux progress
  • Fedora: dnf install grep coreutils util-linux progress

Installation from pip

python3 -m pip install recoverpy

Usage

python3 -m recoverpy

If you are not logged as root use sudo recoverpy or log in with su - before execution.


 Select the system partition in which your file was. If you are out of luck, you can alternatively search in your home partition, maybe your IDE, text editor, etc. made a backup at some point.

 Type a text string to search. See tips below for better results.

Note that searching a string in a whole partition may take a while. (see euphemism)

Default save path is /tmp/, click on Settings to edit configuration.

 Start search, Results will appear in the left-hand box.

 Select a result to display the corresponding partition block content in the right-hand box.

 Once you have found your precious, select Save.

 You can now either save this block individually or explore neighboring blocks for the remaining parts of the file. You could then save it all in one file.

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

11 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

11 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

11 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

11 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

11 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

14 hours ago