// artifact family

secrets manager / pam forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. aws secrets manager access log forensic analyzerdrop aws secrets manager cloudtrail export · parse secret arn + caller + get/put timeline · runs locally
  2. azure key vault access audit forensic analyzerdrop azure key vault diagnostic export · parse key/secret operations + caller ip · runs locally
  3. gcp secret manager access log forensic analyzerdrop gcp secret manager audit export · parse secret version + accessor + iam principal · runs locally
  4. doppler secrets sync audit forensic analyzerdrop doppler audit log export · parse project + secret + sync target · runs locally
  5. cyberark privileged access session forensic analyzerdrop cyberark pvwa session export · parse safe + account + recording id · runs locally
  6. beyondtrust password safe session forensic analyzerdrop beyondtrust session export · parse managed account + jump host + reason · runs locally
  7. one password connect audit log forensic analyzerdrop 1password connect audit export · parse vault + item + token client · runs locally
  8. bitwarden secrets manager audit forensic analyzerdrop bitwarden secrets manager audit export · parse project + secret + machine account · runs locally
  9. secrets rotation failure timeline correlatordrop rotation job log export · correlate failed rotations + stale secret use · runs locally
  10. cross vault secret access correlatordrop 2+ vault/secret manager exports · correlate principal + secret name overlap · runs locally
ready