// case type

supply chain compromise

package compromise, build-system intrusion, signed-update poisoning. needs SBOM + dependency + build artifact analysis.

tools
15
priority
M
processing
local · in browser

start here · primary tools

ordered. work top-down. the first tool is the suggested entry point for this case type.

  1. yara scannerwrite YARA-like rules · scan any file locally · string and byte pattern matching · condition logic · export match report · runs locally
  2. yara rule scannerwrite YARA rules or use 50+ built-in rules · drop any binary to scan · condition matching · string search · hex patterns · offset anchors · export matches · runs locally
  3. pe analyzerdrop a Windows executable · parse PE headers · sections · imports · exports · entropy per section · detect packers · imphash · runs locally
  4. pe static analyzerdrop any .exe · .dll · .sys · parse PE headers · import table · suspicious API categories · section entropy · packer fingerprint · anomaly detection · export report · runs locally
  5. PE compile timestamp vs filesystem timestamp conflict detectordrop mft csv or file listing with pe headers · extract compile timestamps from pe headers · detect files with filesystem timestamps earlier than their compile timestamp · surface impossible binaries indicating timestomping · runs locally
  6. imphash calculatordrop a PE file · compute Mandiant-style import hash · list all imports · compare with known samples · runs locally
  7. binary compiler and language identifierdrop pe elf or macho binaries · identify compiled language · go rust nim python compiled dlang zig · detect compiler version · extract build metadata · language-specific string patterns · runs locally
  8. source code style forensic fingerprinterdrop source code or decompiled text · analyze indentation · naming · comments · apis · stylometric fingerprint · compare authorship · runs locally

also useful · secondary tools

supporting and follow-up tools. surface as the investigation widens.

  1. string ioc correlatorpaste string output or drop binary · match against 300+ known malware family signatures · C2 patterns · mutex names · registry keys · user-agents · export matches · runs locally
  2. binary structural similarity scorerdrop two or more binaries · structural and syntactic similarity · malware variant families · shared imports and strings · runs locally
  3. file dna structural fingerprinterdrop any files · structural fingerprint beyond hash · near-duplicate clusters · ssdeep tlsh section string layers · runs locally
  4. fuzzy hash calculatordrop files · compute ssdeep and tlsh · compare similarity · find malware variants · runs locally
  5. docker image inspectordrop a docker save .tar · parse layers · manifest · config · view file changes per layer · detect secrets in history · show build commands · runs locally
  6. kubernetes config security analyzerpaste or drop Kubernetes YAML · scan for privileged containers · hostPID · missing limits · writable hostPath · NodePort exposure · RBAC issues · runs locally
  7. case report generatorfill in case number · examiner · dates · findings · drop evidence files for auto hash · generates structured forensic report PDF · runs locally
// case-kit pipeline

run as a stack

skip the click-through. these presets are curated forensic pipelines you can save as a stack with one click and run on your evidence locally.

  • supply chain — binary triage

    8 steps

    drop suspect binaries → YARA → PE header → compiler ID → similarity → DNA hash → IOC extract → report

    1. 01evidence-manifest-generatorhash every binary before static analysis
    2. 02yara-testerrun YARA rules against the suspect file set
    3. 03pe-header-memory-anomaly-detectorPE header anomalies that suggest packing or tampering
    4. 04compiler-artifact-identifiercompiler / toolchain fingerprint from binary artifacts
    5. 05binary-similarity-scorersimilarity scoring across the input binary set
    6. 06file-dna-fingerprinterstructural DNA hash for cross-sample correlation
    7. 07ioc-extractorpull URLs, domains, and IPs from embedded strings
    8. 08case-report-generatordraft a report linking binary similarities to the compromise hypothesis
// pattern-matched

tools that the manifest-classifier flagged as plausibly useful here but that aren't in the hand-curated lists above. less editorial weight — scan, don't work top-down.

+ 74 more in this pattern match. browse the full forensics catalog via the forensics category.

ready