// artifact family

kubernetes runtime security forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. falco runtime alert forensic analyzerdrop falco alert export · parse rule + pod + syscall · runs locally
  2. cilium hubble flow log forensic analyzerdrop hubble flow export · parse source + destination + verdict · runs locally
  3. tetragon ebpf event log forensic analyzerdrop tetragon event export · parse process + policy + action · runs locally
  4. calico network policy audit forensic analyzerdrop calico audit export · parse policy + endpoint + action · runs locally
  5. kyverno policy violation forensic analyzerdrop kyverno violation export · parse policy + resource + result · runs locally
  6. opa gatekeeper constraint violation forensic analyzerdrop gatekeeper violation export · parse constraint + kind + message · runs locally
  7. k8s runtime privilege escalation detectordrop k8s runtime log export · detect privilege escalation in pods · runs locally
  8. k8s pod exec anomaly detectordrop k8s exec audit export · detect suspicious kubectl exec bursts · runs locally
  9. multi k8s runtime timeline correlatordrop 2+ k8s runtime exports · unified cluster timeline graph · runs locally
  10. cross k8s runtime network correlatordrop runtime + network flow exports · correlate pod to flow/session · runs locally
ready