// for investigators

1199 browser-only forensics tools, organized for people who actually run investigations. nothing uploads. nothing phones home. your evidence stays on your device.

case types
30
verticals
12
artifact families
35
evidence types
18
tools
1199
processing
local · in browser
// pipelines · live

forensic stacks & case sessions

most investigations chain four to seven tools in the same order every time. forensic stacks let you run that chain as one pipeline — drop a file, get an IOC bundle, a timeline, and a draft case report. 992 stackable forensic tools and 37 curated case-kits are live now — every launch-tier case type has at least one one-click pipeline. browse stack catalog →

// sessions · live case sessions (.fc-case) save your investigation state — runs, notes, chain-of-custody — to a single local file you can re-open weeks later or hand off to a colleague. every stack run is auto-captured into the active session. all of it stays on your device. open the session manager →

// frontier

adversarial AI forensics

AI systems are becoming operating systems — prompts are commands, tool calls are execution traces, vector stores are memory, agents are autonomous processes. AI forensics is execution provenance, not “detect ChatGPT writing”. fatcousin forensics ships the first wave: chatgpt / claude / gemini conversation forensics, prompt-injection artifact detectors, jailbreak-corpus attribution, MCP audit-trail parsers, local-vector-database forensics, AI-generated image provenance. browse ai & llm forensics tools →

// investigator-grade triage

methodology & ship bar

every forensics tool is graded against a five-axis rubric (input flexibility · capability class · data quality · robustness · output format) and held to a public B minimum before shipping. methodology pages will document the parsing approach, known limitations, and validation references so output is usable in disclosure, court filing, or peer review.

ready