Resumable Imaging
If imaging fails at any point, resume from the last checkpoint. Works across power cycles and system restarts. The resume manifest is flushed to disk after every 512 MB checkpoint. No lost work.
Free Download
Free forensic disk imager with resumable imaging, E01 output, three-pass SHA-256 verification and chain of custody. 4.4 MB single executable. Built by CISSP, ISSAP and ISSMP certified forensic examiners.
Sherlock Forensics Disk Imager is a free FTK Imager alternative for Windows with resumable imaging, E01 and raw dd output, three-pass SHA-256 verification and automated chain of custody documentation. It is the first free Windows GUI forensic imager that combines resume capability with E01 output and chain of custody in one 4.4 MB package.
Free forever | Windows 10/11 | No installation | No subscription
The Problem
FTK Imager is the most widely used free forensic disk imaging tool. It has been the default choice for examiners for over a decade. It produces E01 and raw images. It includes a file system browser and memory capture. It works.
But FTK Imager does not support resumable imaging. If a 4TB drive imaging session fails at 90% due to a USB disconnect, power loss or system crash, you start over from byte zero. The partial image is abandoned. Hours of acquisition time are lost.
For small drives, this is an inconvenience. For 4TB, 8TB and 12TB drives that are now common in forensic casework, it is a serious operational problem. A single failed 8TB acquisition can cost an examiner an entire day of lost work. Multiply that across a busy forensic lab handling dozens of cases per month and the lost productivity is significant.
Until now, resumable forensic imaging on Windows required X-Ways Forensics ($1,200+) or EnCase ($3,500+/year). Linux users had ddrescue, which resumes but produces raw output only with no GUI and no chain of custody documentation. There was no free Windows tool that combined resume, E01 output and chain of custody in one package.
Sherlock Forensics Disk Imager fills that gap.
Honest Comparison
We believe transparency builds trust. This table is honest. ddrescue, X-Ways and EnCase all support resume. Our differentiator is being the first free Windows GUI imager with resume, E01 output and chain of custody in one package.
| Tool | Price | Resume | E01 | Chain of Custody | GUI | Platform |
|---|---|---|---|---|---|---|
| Sherlock Forensics Disk Imager | FREE | Yes | Yes | Yes | Yes | Windows |
| FTK Imager | FREE | No | Yes | Partial | Yes | Windows |
| ddrescue | FREE | Yes (CLI) | No | No | No | Linux |
| Guymager | FREE | No | Yes | No | Yes | Linux |
| X-Ways Forensics | $1,200+ | Yes | Yes | Yes | Yes | Windows |
| EnCase | $3,500+/yr | Yes | Yes | Yes | Yes | Windows |
Pricing based on publicly available information as of April 2026. X-Ways pricing varies by license tier. EnCase pricing is annual subscription. Contact each vendor for current quotes. FTK Imager's "Partial" chain of custody means it logs some metadata but does not produce a standalone chain of custody document.
Differentiator
Other tools have resume. ddrescue has had it for years. X-Ways and EnCase have had it for years. We are not claiming to invent resumable imaging. We are claiming to be the first tool that delivers all of the following in one free package:
No other free tool on any platform combines all six of these capabilities.
Features
If imaging fails at any point, resume from the last checkpoint. Works across power cycles and system restarts. The resume manifest is flushed to disk after every 512 MB checkpoint. No lost work.
Choose Expert Witness Format (E01) with compression and embedded metadata or raw dd for universal compatibility. Both formats receive identical three-pass SHA-256 verification.
Source drive hash, destination image hash and source re-read hash. The third pass catches transient drive errors and degradation that standard two-pass verification cannot detect.
Every imaging session produces an automated log with drive identification, examiner details, timestamps and all hash values. Integrates with the Sherlock chain of custody framework used across all our forensic tools.
Single executable. No installer. No runtime dependencies. No .NET framework. Copy it to a USB drive alongside your write blocker and you have a complete imaging toolkit.
Works with Sherlock Forensics USB Write Blocker and all hardware write blockers from Tableau (OpenText) and CRU. The imaging log records write protection status for chain of custody.
Transparency
Honesty about limitations is a sign of competence. Sherlock Forensics Disk Imager is a focused tool. It does one job: forensic disk imaging with resume and verification. Here is what it does not do.
For most forensic workflows, Sherlock Forensics Disk Imager and FTK Imager are complementary tools rather than replacements for each other. Use both. If you need help determining the right tool for your investigation, call us at 604.229.1994.
Use Cases
If you have lost an imaging session to a USB disconnect or power failure on a large drive, you know the frustration. Sherlock resumes from the last checkpoint. Keep FTK Imager for browsing and memory capture. Use Sherlock for production imaging.
If you have been using ddrescue through a Linux live boot or WSL because it supports resume, Sherlock gives you the same resume capability in a native Windows GUI with E01 output and chain of custody documentation that ddrescue lacks.
X-Ways starts at $1,200. EnCase runs $3,500+ per year. Both support resume. If your lab needs resumable imaging but cannot justify those costs, Sherlock delivers the same resume capability for free.
When you arrive at a client site for evidence preservation, you need a tool that runs immediately. Sherlock is 4.4 MB with no installation. Copy it to your forensic USB drive and you are ready to image within seconds of arrival.
During active incident response engagements, imaging speed and reliability are critical. A failed 4TB acquisition during a breach investigation costs hours you do not have. Resume capability eliminates that risk.
Small police departments and municipal agencies that need forensic-grade imaging without the budget for commercial tools. Free tool, full chain of custody, court-ready documentation.
Technical Detail
Sherlock Forensics Disk Imager maintains a resume manifest file alongside the forensic image during acquisition. The manifest records the source drive serial number, the imaging format, the last successfully verified sector offset and a running SHA-256 computation state. The manifest is written to disk after every 512 MB checkpoint.
When imaging is interrupted for any reason, the partial image and manifest remain on the destination drive. When the examiner relaunches Sherlock and selects the same source and destination, the tool detects the existing partial acquisition. It verifies the integrity of completed data against the manifest, confirms the source drive serial number matches and offers to resume from the last checkpoint.
For E01 format, resume operates at segment boundaries. Each E01 segment is self-contained with internal CRC checksums. Sherlock verifies all completed segments before continuing. For raw dd format, resume uses sector-level tracking with 512 MB checkpoint granularity.
The resume mechanism works across power cycles and system restarts. Because the manifest is flushed to disk at every checkpoint, even an abrupt power loss preserves the resume state. The maximum data loss from an unclean interruption is 512 MB, the distance between checkpoints. Compare this to FTK Imager where any interruption loses the entire acquisition.
For context on how resume integrates with the broader forensic workflow, see our chain of custody documentation. The resume manifest becomes part of the chain of custody record, documenting any interruptions that occurred during acquisition.
Integrity
Standard forensic imaging tools perform two-pass verification: they hash the source drive once and hash the destination image once, then compare. If the hashes match, the image is deemed forensically sound.
Sherlock Forensics Disk Imager adds a third pass. After computing the source and destination hashes, it re-reads the source drive entirely and computes a third SHA-256 hash. All three values must match.
The third pass detects a specific failure mode: transient read errors on the source drive. A drive with developing bad sectors may return different data on subsequent reads of the same sectors. If the source drive returned corrupted data during imaging that it does not reproduce on the verification read, the Pass 1 and Pass 3 hashes will differ. Two-pass verification cannot detect this because it only reads the source once for hashing.
When Pass 1 and Pass 3 differ, Sherlock flags the acquisition as potentially compromised and logs the discrepancy. The examiner can then decide whether to re-image with ddrescue (which handles bad sectors more aggressively) or document the discrepancy in their report.
Three-pass verification adds time. For a 2TB drive, expect roughly 4 to 6 additional hours for the third pass. This is configurable. Examiners who need faster turnaround can select two-pass verification in the settings. For casework heading to court, we recommend the three-pass default.
Legal
Courts evaluate forensic methodology rather than tool brand or price. A free tool that produces proper SHA-256 hashes, complete chain of custody documentation and reproducible results meets the same evidentiary standards as a $3,500/year commercial platform.
Under the Daubert standard, admissibility of forensic evidence depends on whether the methodology is scientifically valid, whether it has been tested and whether it produces reliable results. Bit-for-bit disk imaging with SHA-256 hash verification is a well-established forensic methodology accepted by courts worldwide. The tool used to perform the imaging is less important than the methodology followed and the documentation produced.
Sherlock Forensics Disk Imager produces the documentation elements courts require: source drive identification, write protection verification, complete imaging parameters, SHA-256 hash values with timestamps and examiner identification. For additional guidance on forensic tool validation, refer to the NIST Computer Forensics Tool Testing Program and SWGDE best practices.
Questions
Get Started
Download Sherlock Forensics Disk Imager and never restart a failed acquisition from scratch again. Free forever. 4.4 MB. No installation. Built by the same team that delivers forensic investigations and incident response across British Columbia.
Call us. We will assess your requirements in a five-minute phone call and recommend the right tool for your workflow. If Sherlock is not the right fit, we will tell you what is.
Call 604.229.1994Sherlock Forensics Disk Imager is provided for lawful forensic use only. Terms of Service