// artifact family

deception / honeypot platform forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. thinkst canary incident export forensic analyzerdrop canary incident export · parse token + attacker ip + action · runs locally
  2. smokescreen deception event forensic analyzerdrop smokescreen event export · parse decoy + interaction + severity · runs locally
  3. trapx deception incident forensic analyzerdrop trapx incident export · parse trap + attacker + stage · runs locally
  4. countercraft deception log forensic analyzerdrop countercraft log export · parse decoy + lure + engagement · runs locally
  5. illusive networks deception export forensic analyzerdrop illusive export · parse endpoint + deception + policy · runs locally
  6. honeypot decoy interaction burst detectordrop deception event export · detect decoy interaction bursts · runs locally
  7. deception lateral movement chain correlatordrop deception export · reconstruct lateral movement via decoys · runs locally
  8. decoy credential use detectordrop deception credential export · detect decoy credential authentication · runs locally
  9. multi honeypot incident timeline correlatordrop 2+ deception exports · unified attacker timeline graph · runs locally
  10. cross honeypot edr endpoint correlatordrop deception + edr exports · correlate decoy hit to endpoint alert · runs locally
ready