// artifact family

ransomware / leak site forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. ransomware negotiation chat log forensic analyzerdrop negotiation chat export · parse actor aliases + demands + deadline shifts · runs locally
  2. ransomware victim portal access log forensic analyzerdrop victim portal access log · parse login tokens + download attempts + ip hints · runs locally
  3. double extortion leak site post forensic analyzerdrop leak site post html/json export · parse victim name + file tree + countdown · runs locally
  4. leak site onion service metadata forensic extractordrop onion service descriptor export · parse v3 address + intro points + cert hints · runs locally
  5. ransom note variant cluster forensic analyzerdrop ransom note text corpus · cluster variants + language + btc address reuse · runs locally
  6. ransomware initial access staging timeline correlatordrop edr + portal + note exports · correlate staging → encryption timeline · runs locally
  7. ransomware group affiliate switch detectordrop negotiation + leak post exports · detect rebrand/affiliate handoff patterns · runs locally
  8. ransomware payment channel trace forensic analyzerdrop payment instructions export · parse btc/xmr/onion callback + amount drift · runs locally
  9. ransomware tor callback artifact forensic extractordrop tor hidden service callback log · parse session ids + user-agent + timing · runs locally
  10. ransomware data exfil manifest forensic analyzerdrop exfil manifest csv/json · parse file counts + paths + upload batch timeline · runs locally
ready