// artifact family

siem platform forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. splunk enterprise security notable export forensic analyzerdrop splunk es notable export · parse rule + urgency + owner · runs locally
  2. elastic security detection alert forensic analyzerdrop elastic security alert export · parse rule + host + severity · runs locally
  3. exabeam security analytics event forensic analyzerdrop exabeam event export · parse session + risk score + user · runs locally
  4. securonix sniper threat forensic analyzerdrop securonix threat export · parse policy + entity + risk · runs locally
  5. devo platform query export forensic analyzerdrop devo query export · parse alert + source + tag · runs locally
  6. siem rule suppression anomaly detectordrop siem rule config export · detect mass suppression changes · runs locally
  7. siem alert fatigue pattern detectordrop siem alert export · detect repetitive low-value alert storms · runs locally
  8. siem correlation rule change detectordrop siem rule audit export · detect unauthorized rule edits · runs locally
  9. multi siem incident timeline correlatordrop 2+ siem incident exports · unified alert timeline graph · runs locally
  10. cross siem identity alert correlatordrop siem + iam exports · correlate alert subject to active accounts · runs locally
ready