// artifact family
network forensics
63 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.
tools in this family
ordered as in the forensics catalog. every tool runs locally — no upload, no account.
- pcap readerdrop a .pcap or .pcapng · parse packets · filter by protocol · extract HTTP · DNS · plaintext credentials · runs locally
- pcap / pcapng analyzerdrop a pcap or pcapng file · packet list · protocol breakdown · tcp stream reconstruction · dns queries · http requests · connection graph · runs locally
- netflow analyzerdrop netflow v5 v9 or ipfix exports · traffic patterns · top talkers · protocol distribution · geographic connections · runs locally
- pcap http stream rebuilderdrop a PCAP · reconstruct HTTP request/response pairs · extract headers · detect file transfers · flag suspicious payloads · export sessions · runs locally
- PCAP network flow reconstructordrop pcap or pcapng file · parse all packets · reconstruct tcp and udp flows · compute flow statistics · surface top talkers unusual ports and flow anomalies · runs locally
- network connection timeline builderdrop pcap pcapng or zeek conn log or windows netstat output · build a chronological connection timeline · reconstruct what connected where and when · surface connection bursts gaps and suspicious temporal patterns · runs locally
- ARP spoofing artifact detectordrop pcap or pcapng file · detect arp cache poisoning and spoofing artifacts · identify conflicting mac-to-ip mappings · surface mitm enablement and arp flood patterns · runs locally
- port scan pattern detectordrop pcap or pcapng file or zeek conn log · detect port scanning behavior · identify scan techniques syn connect udp and stealth scans · surface scanning source ips targets and scan timing · runs locally
- protocol misuse detectordrop pcap or pcapng file · detect protocols being used outside their standard specification · identify c2 channels hidden in legitimate protocols · surface application data on wrong ports and protocol-level anomalies · runs locally
- network flow anomaly detectordrop pcap pcapng or zeek conn log · apply statistical anomaly detection to network flows · surface outliers in byte count duration connection rate and port usage · identify scanning exfiltration and tunneling anomalies · runs locally
- ICMP tunnel artifact detectordrop pcap or pcapng file · detect data encoded in icmp payloads · identify icmp tunneling tools · surface non-standard icmp usage and covert icmp channels · runs locally
- tls handshake parserdrop a PCAP · parse TLS ClientHello · extract SNI · cipher suites · JA3 fingerprint · detect unusual suites · export CSV · runs locally
- tls ja3 fingerprinterdrop a pcap file · extract tls client hellos · compute ja3 fingerprints · identify known clients and malware · database of known fingerprints · runs locally
- tls certificate chain analyzerpem der p7b pfx · parse chain validity extensions · weak crypto flags · fingerprints · rsa verify via issuer · no outbound ct · runs locally
- dns query analyzerdrop a PCAP or paste DNS log · extract queries · detect DGA patterns · DNS tunneling · high-frequency domains · suspicious TLDs · export CSV · runs locally
- dns query log analyzerdrop dns server logs · query frequency · dga detection · beaconing · nxdomain patterns · top domains · runs locally
- dhcp log analyzerdhcpd dnsmasq windows dhcp csv · ip mac hostname timeline · oui hints · starvation reuse anomalies · csv export · runs locally
- vpn log analyzerdrop openvpn wireguard anyconnect logs · sessions · concurrent logins · geo heuristics embedded · anomalies · runs locally
- wifi handshake inspectordrop a PCAP · detect WPA2 4-way handshakes · extract SSID · BSSID · client MAC · MIC · export for cracking · runs locally
- network beaconing detectordrop connection logs or PCAP · statistical analysis of connection intervals per host · jitter detection · C2 beaconing patterns · periodic callback identification · export CSV · runs locally
- beaconing pattern detectordrop pcap or zeek conn log · periodic c2 beacon intervals · regularity and jitter scores · export csv · runs locally
- dns query timeline builderdrop pcap or dns log · parse queries and responses · build timeline · nxdomain and dga patterns · export csv · runs locally
- dns tunneling detectordrop pcap or dns log · high-entropy subdomains · long query names · dns c2 and exfil channels · export csv · runs locally
- c2 callback interval analyzerdrop pcap or zeek conn log · deep interval stats · c2 framework timing profiles · jitter estimation · export csv · runs locally
- tls certificate chain forensic analyzerdrop pcap · extract tls handshakes · parse certificates · ja3 and sni anomalies · export csv · runs locally
- wireless probe request artifact analyzerdrop monitor-mode pcap · extract 802.11 probe requests · device ssid history · tracking artifacts · export csv · runs locally
- pcap malware family fingerprinterdrop pcap · ja3 imphash sni and http signatures · malware family attribution from network traffic · export csv · runs locally
- url redirect chain tracerpaste shortened URLs · trace full redirect chain via proxy · detect malicious redirects · show final destination · flag suspicious hops · runs locally
- domain reputation analyzerpaste domains or IPs · score by entropy · TLD risk · homoglyph detection · DGA patterns · punycode abuse · age heuristics · no external lookup · runs locally
- user agent analyzerpaste user agent strings · parse browser · OS · device · version · detect bots · spoofed agents · crawlers · headless browsers · inconsistencies · runs locally
- archive password auditordrop a password-protected ZIP · test a custom wordlist locally · no data leaves your device · runs locally
- http access log analyzerdrop apache nginx iis access logs · request timeline · top ips · error analysis · scanner detection · web shell access · sqli xss patterns · runs locally
- zeek / bro log analyzerdrop zeek tsv logs · conn dns http ssl files weird · correlate across logs · connection timeline · ioc extraction · runs locally
- wifi pcap forensicsdrop an 802.11 pcap · probe requests · beacons · deauth attacks · client tracking · ssid history · runs locally
- encrypted communication detectordrop network logs pcap or connection data · detect encrypted channels · non-standard ports · tunneling · covert channels · runs locally
- irc botnet log analyzerdrop irc log files · detect bot commands · extract c2 channels · nick patterns · command flood · runs locally
- smtp pcap reconstructordrop pcap or pcapng · tcp reassembly ports 25 587 465 · mail from rcpt to data · mime attachments · download eml · export csv · runs locally
- http2 pcap parserdrop pcap or pcapng · tcp reassembly · h2c preface pri http/2 · tls alpn h2 · hpack decode · stream method path status · export csv · runs locally
- bgp log analyzercisco ios · quagga frr · juniper text · mrt binary · update withdrawal peer · hijack more-specific as loop flapping · export csv · runs locally
- smb stream reconstructordrop pcap or pcapng port 445 139 · smb2 ntlmssp session setup · tree connect create read write reassembly · download zip · export csv · runs locally
- ftp session reconstructordrop pcap or pcapng · control port 21 user pass retr stor pasv port · data channel match · credentials · download zip · export csv · runs locally
- smb traffic analyzerdrop smb pcap csv or conn log · admin share access · failed auth bursts · export csv · runs locally
- kerberos traffic analyzerparse kerberos pcap csv or evtx 4768/4769 · flag as-rep roast · rc4 kerberoast bursts · runs locally
- ldap enumeration detectorparse ldap bind/search logs csv · flag anonymous bind · bulk enumeration · runs locally
- wifi probe history analyzerparse probe request csv · timeline ssids per client · suspicious hidden networks · runs locally
- quic and http3 flow forensic analyzerdrop pcap · quic udp flows · http3 hints · quic c2 indicators · client fingerprint · tunneling flags · runs locally
- icmp covert channel detector and extractordrop pcap · icmp echo analysis · payload encoding · timing patterns · extract covert data · icmp tunneling · runs locally
- process to network connection correlatordrop sysmon evtx csv with event 3 · or netstat snapshots · and process creation events · link specific process executions to specific network connections via pid and timestamp · identify which process made which connection · runs locally
- socks proxy chain forensic detectordrop pcap · socks4 socks5 tunnels · proxy chaining · destination extraction · topology map · csv export · runs locally
- dns over tls and dns over https detectordrop pcap · dot on 853 · doh sni patterns · encrypted dns clients · c2 beaconing hints · csv export · runs locally
- ipv6 tunneling and covert channel detectordrop pcap · 6in4 teredo isatap 6to4 · ipv6 extension anomalies · flow label covert hints · bypass assessment · csv export · runs locally
- tls session ticket forensic analyzerdrop a pcap file · extract tls session tickets from client hello extensions · link multiple tls connections to the same underlying session · de-anonymize traffic across apparent ip changes · detect session ticket reuse across different source ips · runs locally
- tcp retransmission pattern forensic analyzerdrop a pcap file · analyze tcp retransmission patterns · detect network-level manipulation · traffic injection attempts · side-channel information leakage · reconstruct what happened at the network level that caused unusual retransmissions · runs locally
- sni certificate mismatch and domain fronting detectordrop a pcap file · scan tls connections for sni hostname mismatch against certificate common name · detect domain fronting · c2 evasion via cdn · interception indicators · flag connections where traffic claims to be somewhere it is not · runs locally
- http cookie lifecycle forensic analyzerdrop a pcap file or browser cookie database exports · reconstruct the complete lifecycle of session cookies · creation renewal expiry · detect cross-site cookie sharing that links identities · identify session hijacking indicators · runs locally
- passive os fingerprinter from pcapdrop a pcap file · reconstruct the operating system of every host from tcp/ip stack behavior · ttl values · window sizes · tcp options ordering · ip flag patterns · no active probing · identify os from existing captured traffic · runs locally
- arp table timeline and mac change detectordrop multiple arp table dumps or pcap with arp traffic · reconstruct the history of which mac was at which ip · detect mac address changes indicating spoofing or device swap · identify arp poisoning attempts · runs locally
- http request response artifact extractordrop pcap or pcapng · tcp reassembly · extract http methods urls status codes headers · user agent inventory · credential flags · export csv · runs locally
- pcap cleartext credential extractordrop pcap or pcapng · extract cleartext ftp smtp pop3 imap http basic telnet credentials · tcp reassembly · export csv · runs locally
- pcap email artifact extractordrop pcap or pcapng · smtp pop3 imap tcp reassembly · sender recipient subject attachments · starttls detection · export csv · runs locally
- pcap file transfer reconstructordrop pcap or pcapng · reconstruct http ftp smb file transfers · sha256 magic bytes · download reconstructed files · export csv · runs locally
- smb artifact forensic analyzerdrop pcap or pcapng · smb2 sessions shares file ops · ntlm capture formatting · admin share lateral movement alerts · export csv · runs locally
- lateral movement network pattern detectordrop pcap pcapng or zeek conn log · detect smb admin share rdp hops credential reuse pivot patterns · movement chain · export csv · runs locally