// artifact family

soar / incident orchestration forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. cortex xsoar incident war room forensic analyzerdrop xsoar incident json export · parse war room entries + task timeline + owner · runs locally
  2. splunk soar playbook run forensic analyzerdrop splunk soar container/run export · parse playbook blocks + action results · runs locally
  3. swimlane case timeline forensic analyzerdrop swimlane case export · parse record events + automation + assignee · runs locally
  4. torq automation run log forensic analyzerdrop torq workflow run export · parse step status + integration calls · runs locally
  5. servicenow security incident response forensic analyzerdrop servicenow secops incident export · parse tasks + cmdb links + state · runs locally
  6. pagerduty incident bridge forensic analyzerdrop pagerduty incident + bridge export · parse responder timeline + conference events · runs locally
  7. xsoar indicator ledger forensic extractordrop xsoar indicator export · parse reputation + relationships + expiration · runs locally
  8. incident response playbook deviation detectordrop soar playbook run export · detect skipped steps + manual overrides · runs locally
  9. soar enrichment action forensic analyzerdrop soar enrichment task export · parse vendor queries + hit counts · runs locally
  10. multi soar playbook correlation tooldrop 2+ soar run exports · correlate incident id + shared indicators · runs locally
ready