// artifact family
vulnerability / exposure management forensics
10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.
tools in this family
ordered as in the forensics catalog. every tool runs locally — no upload, no account.
- tenable nessus scan export forensic analyzerdrop nessus .nessus/csv export · parse plugin + severity + host · runs locally
- qualys vmdr finding export forensic analyzerdrop qualys vmdr detection export · parse qid + asset + status timeline · runs locally
- rapid7 insightvm asset vulnerability forensic analyzerdrop insightvm asset vuln export · parse nexpose id + proof + solution · runs locally
- microsoft defender vulnerability management export analyzerdrop defender tvm export · parse cve + affected software + exposure score · runs locally
- crowdstrike spotlight vulnerability export analyzerdrop spotlight vuln export · parse cve + host + remediation status · runs locally
- wiz exposure finding forensic analyzerdrop wiz exposure issue export · parse attack path + toxic combination · runs locally
- shodan host export forensic analyzerdrop shodan host json export · parse open ports + banners + vuln tags · runs locally
- censys host certificate export forensic analyzerdrop censys host export · parse services + cert fingerprints · runs locally
- vulnerability remediation sla breach detectordrop vuln finding corpus export · detect sla breach + reopen patterns · runs locally
- cross scanner cve overlap correlatordrop 2+ scanner exports · correlate cve + asset overlap graph · runs locally