// artifact family

vulnerability / exposure management forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. tenable nessus scan export forensic analyzerdrop nessus .nessus/csv export · parse plugin + severity + host · runs locally
  2. qualys vmdr finding export forensic analyzerdrop qualys vmdr detection export · parse qid + asset + status timeline · runs locally
  3. rapid7 insightvm asset vulnerability forensic analyzerdrop insightvm asset vuln export · parse nexpose id + proof + solution · runs locally
  4. microsoft defender vulnerability management export analyzerdrop defender tvm export · parse cve + affected software + exposure score · runs locally
  5. crowdstrike spotlight vulnerability export analyzerdrop spotlight vuln export · parse cve + host + remediation status · runs locally
  6. wiz exposure finding forensic analyzerdrop wiz exposure issue export · parse attack path + toxic combination · runs locally
  7. shodan host export forensic analyzerdrop shodan host json export · parse open ports + banners + vuln tags · runs locally
  8. censys host certificate export forensic analyzerdrop censys host export · parse services + cert fingerprints · runs locally
  9. vulnerability remediation sla breach detectordrop vuln finding corpus export · detect sla breach + reopen patterns · runs locally
  10. cross scanner cve overlap correlatordrop 2+ scanner exports · correlate cve + asset overlap graph · runs locally
ready