// artifact family

ngfw / firewall platform forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. palo alto traffic log forensic analyzerdrop palo alto traffic log export · parse app-id + rule + session end reason · runs locally
  2. fortinet fortigate traffic log forensic analyzerdrop fortigate traffic log export · parse policy id + utm refs + action · runs locally
  3. checkpoint firewall log forensic analyzerdrop checkpoint log export · parse blade + rule + nat hints · runs locally
  4. cisco firepower connection log forensic analyzerdrop firepower connection event export · parse intrusion policy + file action · runs locally
  5. juniper srx flow log forensic analyzerdrop srx flow session log export · parse zone + policy + service · runs locally
  6. sophos firewall traffic log forensic analyzerdrop sophos xg traffic log export · parse fw rule + app control + web filter · runs locally
  7. watchguard firebox traffic log forensic analyzerdrop watchguard traffic log export · parse policy + geolocation + ips hit · runs locally
  8. pfsense filterlog forensic analyzerdrop pfsense filterlog export · parse rule number + interface + action · runs locally
  9. opnsense firewall log forensic analyzerdrop opnsense firewall log export · parse alias + gateway + block/pass · runs locally
  10. multi ngfw traffic correlatordrop 2+ ngfw traffic exports · correlate src/dst + app overlap · runs locally
ready