Vision
Forensics for Everyone
Crow-Eye mission is to put the truth of what happened on a computer into the hands of every person — not just experts. Crow-Eye helps users understand what happened on their machine, even if they have no technical background.
By correlating forensic data and presenting it in a clear, human-friendly way, Crow-Eye empowers everyone to investigate their device’s activity.
Whether you’re a parent worried about what your teen downloaded, a senior who thinks they might have been scammed, or just someone wondering why their PC feels “off,” Crow-Eye will analyze your PC , understands the deep forensic traces Windows leaves behind, and explains them in plain, trustworthy language.
Soon you’ll simply ask Crow-Eye Assistant (we call it “Eye”):
- “Was anyone using my laptop while I was away last weekend?”
- “Which program has been secretly connecting to the internet?”
Eye answers instantly, shows you the proof, and never sends your data anywhere.
Faster, Smarter DFIR
- Advanced parsing of Windows artifacts
- Detection of evasion techniques
- Proof-of-execution and file activity tracing
- One-click proof-of-execution
- Raw artifact views + correlated views
- Plugin system for custom parsers, correlation rules, and workflow extensions
Crow-Eye lets investigators skip repetitive manual work, focus on complex reasoning, and achieve faster, more accurate results.
Crow-Eye for Business
Crow-Eye goes beyond single-machine analysis with a scalable multi-machine processing engine.
Businesses can:
- Parse and store artifacts from multiple machines
- Maintain historical forensic data (even after Windows deletes it)
- Access device activity anytime during an incident
- Reduce dependency on high-cost forensic solutions
- Gain continuous visibility without enterprise-level budgets
Crow-Eye delivers daily or weekly micro-forensics for small and medium businesses, giving them real security insight without heavy infrastructure. Small and medium businesses finally get the investigative power that only large corporations could afford before.
Crow-Eye Research
Crow-Eye is more than software — it’s an open research platform accelerating the entire field of Windows forensics.
The project focuses on:
- Publishing detailed documentation on internal artifact structures
- Sharing correlation logic and methodologies
- Enabling peer review, transparency, and academic collaboration
Key Features
Live & Offline Modes
Analyze artifacts directly from the running system or imported from an offline image or backup directory.
SQLite-Driven Architecture
All artifact data is parsed into a normalized SQLite database for structured queries, filtering, and exporting.
Graphical User Interface
Intuitive GUI built with PyQt5 and Streamlit simplifies interaction and reduces reliance on command-line operations.
Export Options
Export parsed results in CSV and JSON formats for integration with other tools or reporting systems.
Search Engine
Built-in search functionality for querying and filtering parsed artifacts across the SQLite database.
Timeline Visualization
Interactive timeline views to visualize correlations, timestamps, and activity patterns from forensic artifacts.
In Future
Upcoming disk image (E01/RAW) parsing, multi-host investigation support, correlation heuristics, evasion detection modules, timeline visualization, and a community plugin ecosystem.
Supported Artifacts
Prefetch
Execution history, run count, timestamps
Registry
Auto-run, UserAssist, ShimCache, BAM, networks, time zone
Jump Lists & LNK
File access, paths, timestamps, metadata
Event Logs
System, Security, Application events
Amcache
App filename,Full path, install time,publisher, product/version,file size,volume introduction timestamp
ShimCache
File name, Full path, last-modified timestamp
ShellBags
Folder views, access history, timestamps
MRU & RecentDocs
Typed paths, Open/Save history, recent files
MFT Parser
File metadata, deleted files, timestamps
USN Journal
File changes (create/modify/delete)
Recycle Bin
Deleted file names, paths, deletion time
SRUM
App resource usage, network, energy, execution
- Correlation Engine
- AI Integration
- Multi-Computer Parsing
- Enhanced Parsers
- Plugin System for Custom Parsers & Correlation Rules
- Offline Artifact Parsing
- Imaging Support (ISO) E01/RAW
Crow-Eye CLI Tools
AmCache Parser
Extracts metadata from Amcache.hve, including application details, execution history, and file associations for forensic investigations.
Prefetch Parser
Analyzes Windows Prefetch files to uncover execution evidence, including run counts, timestamps, and resource usage, supporting Windows XP to 11.
ShimCache Parser
Parses ShimCache data to reveal application compatibility details, execution timestamps, and system interaction patterns for threat hunting.
Development Roadmap
The development of Crow Eye is structured into three progressive phases to ensure a stable, scalable, and research-aligned forensic engine.
-
🔹 Phase 1 – Core Parsers & Timeline GUI (Current Phase)
Implementation of SRUM, Shellbags, and enhanced Registry parsers (shellbags, BAM, Dam, Amcache, Shimcache, Network interfaces, Auto Runs and more). Develop the SQLite backend, design a PyQt5-based timeline GUI, and improve export functionality. Establish the core infrastructure for data collection and visualization. -
🔹 Phase 2 – Correlation Engine, Evasion Detection & Plugin System
Build a heuristic correlation engine to automatically link evidence across artifacts. Add evasion detection logic (e.g., timestamp inconsistencies, YARA scanning). Develop a plugin system for extensibility and enhance the GUI with filtering, timeline controls, and export options. -
🔹 Phase 3 – Multi-System Support & Centralized Platform
Expand the tool into a scalable forensic platform. Implement disk image parsing (E01/RAW), a REST API, and multi-system timeline correlation. Add centralized dashboards, SDK documentation, community tools, and cross-host investigation capabilities.
If you're interested in supporting or collaborating on any of these stages, please get in touch.
About the Developer
Crow Eye is developed and maintained by Ghassan Elsman as both a practical forensic tool and a research proof of concept. The project is open to collaboration and contributions. For inquiries or support, feel free to reach out:
📧 [email protected] | 🔗 GitHub Repository | 💼 LinkedIn Profile