// artifact family

network telemetry / ndr

12 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
12
catalog slugs
12
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. zeek conn log forensic deep analyzerdrop zeek conn.log · parse session metadata + duration anomalies · runs locally
  2. zeek dns log forensic deep analyzerdrop zeek dns.log · parse query + answer pairs + dga heuristics · runs locally
  3. zeek ssl log forensic deep analyzerdrop zeek ssl.log · parse ja3/ja3s + cert subjects + version downgrades · runs locally
  4. zeek http log forensic deep analyzerdrop zeek http.log · parse request/response + ua + uri anomalies · runs locally
  5. zeek files log forensic deep analyzerdrop zeek files.log · parse transferred files + hashes + mime · runs locally
  6. suricata eve log forensic deep analyzerdrop suricata eve.json · parse alerts + flow + protocol metadata · runs locally
  7. suricata rule match coverage analyzerdrop suricata rule set + eve.json · score detection coverage gaps · runs locally
  8. arkime pcap session export forensic analyzerdrop arkime session export · parse session metadata · runs locally
  9. corelight export forensic analyzerdrop corelight export bundle · parse zeek + suricata logs together · runs locally
  10. darktrace incident export forensic analyzerdrop darktrace incident export · parse model breaches + behaviours · runs locally
  11. vectra detection export forensic analyzerdrop vectra detection export · parse priority + entities · runs locally
  12. stealthwatch flow export forensic analyzerdrop cisco stealthwatch flow export · parse flows + behavior · runs locally
ready