// case type
trade secret / IP theft
exiting employee took the source/customer list/CAD. preserve USB attach times, cloud-sync, print, and email-out evidence.
start here · primary tools
ordered. work top-down. the first tool is the suggested entry point for this case type.
- windows lnk deep analyzerdrop Windows .lnk shortcut files · parse full shell link structure · target path · command line · machine GUID · volume serial · timestamps · network share · tracker block · export CSV · runs locally
- lnk timeline correlatordrop multiple Windows .lnk shortcuts · unified FILETIME timeline · machine GUID · volume serial · dedupe targets · CSV export · runs locally
- lnk file batch timeline correlatordrop hundreds of lnk shortcut files or lnk csv exports · build single unified recently-accessed timeline · deduplicate · surface deleted source files · correlate access times across all shortcuts · runs locally
- shellbags analyzerdrop a Windows registry hive · extract shellbag entries · folder browsing history · paths · timestamps · export CSV · runs locally
- windows jump list parserdrop .automaticDestinations-ms or .customDestinations-ms · parse OLE structure · extract recently accessed files per app · timestamps · AppIDs · export CSV · runs locally
- jump list cross-application timeline correlatordrop multiple jlecmd csv exports · unified timeline · cross-app document access · network and removable flags · export csv · runs locally
- print spooler artifact forensic analyzerdrop shd spool files evtx csv registry exports · print job history · printnightmare indicators · export csv · runs locally
- document hidden print history extractordrop docx xlsx pptx doc xls ppt · hidden print audit trail · printer name · print timestamp · page count · every print job · runs locally
also useful · secondary tools
supporting and follow-up tools. surface as the investigation widens.
- browser download history correlatordrop chrome history sqlite and optional mft csv · parse download records · correlate against filesystem evidence · identify downloaded files that were deleted · surface download chain from referrer to file to execution · runs locally
- download history analyzerdrop Chrome or Firefox history SQLite · extract downloaded files · source URLs · referrers · timestamps · flag suspicious domains · export CSV · runs locally
- user workstation affinity mapperdrop months of 4624 logon evtx csv · build statistical profile of which user uses which machine · compute affinity scores · flag when a user logs into an unusual machine · detect account takeover by changed workstation usage · runs locally
- natural language writing sample authorship comparatordrop multiple text files or paste writing samples · compute 40 plus stylometric features · sentence length distribution · vocabulary richness · function word frequencies · punctuation patterns · produce similarity score with confidence intervals between samples · runs locally
- git repository forensic analyzerdrop a .git directory or git bundle file · extract full commit history · recover deleted commits via reflog · stash contents · author metadata · file change history · detect secret leaks in history · runs locally
- case report generatorfill in case number · examiner · dates · findings · drop evidence files for auto hash · generates structured forensic report PDF · runs locally
run as a stack
skip the click-through. these presets are curated forensic pipelines you can save as a stack with one click and run on your evidence locally.
trade secret — exfil kit
8 stepsdrop LNK / jumplist / shellbag / print spool / download history / git exports → timeline → report
- 01evidence-manifest-generatorhash every artifact before timeline reconstruction
- 02lnk-batch-timeline-correlatorbatch-correlate LNK shortcuts into a file-access timeline
- 03jumplist-deep-correlatordeep jumplist analysis for recently accessed files
- 04shellbag-timeline-extendedshellbag folder-access timeline for USB / network paths
- 05print-spool-forensicsprint spool artifacts — exfil via printed documents
- 06browser-download-history-correlatorcorrelate browser downloads with file-access artifacts
- 07git-repository-forensicsgit history analysis if source code exfil is suspected
- 08case-report-generatordraft a report linking artifact timelines to the exfil hypothesis