Privacy-first DFIR tools that run entirely in your browser
Analyze text, timestamps, files and email headers locally in your browser. No upload. No login. Instant results.
Available Tools
Each tool runs 100% in your browser — your data never leaves your device.
IOC Extractor
Regex-based extractionPaste logs, reports or raw text and automatically extract IPs, domains, URLs, hashes, CVEs and more.
Analyze a SIEM alert dump or a threat report in seconds.
Open ToolTimestamp Converter
Multi-formatConvert between Unix epoch, Windows FILETIME, WebKit/Chrome timestamps, ISO 8601 and EXIF formats.
Decode a FILETIME value from a registry artifact.
Open ToolHash Calculator
Web Crypto APICompute MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes for text or files. Compare against known values.
Verify file integrity or check a hash against a known IOC.
Open ToolEmail Header Analyzer
Phishing triageParse raw email headers and inspect SPF, DKIM, DMARC results, received hops and suspicious indicators.
Triage a phishing email in seconds.
Open ToolMetadata Extractor
EXIF extractionInspect EXIF data, PDF metadata and document properties. Extract timestamps, creators and device information.
Verify image authenticity or extract creation dates from documents.
Open ToolLog Timeline Builder
Log analysisParse syslog, CSV logs and generic text to build a chronological timeline. Filter by severity and search.
Reconstruct an attack timeline from security logs.
Open ToolBase64/XOR Decoder
Malware triageDecode suspicious strings, scripts and obfuscated payloads locally in your browser.
Decode suspicious script snippets and triage payload artifacts quickly.
Open ToolEVTX Parser Lite
Windows logsInspect Windows Event Logs locally for fast incident response triage.
Review key Windows security events from EVTX exports in seconds.
Open ToolWeb Server Log Analyzer
Log triageParse Common/Combined web server logs, apply heuristics for SQLi, XSS and path traversal, highlight suspicious requests and export results as CSV.
Triage web server logs and export suspicious requests as CSV for investigations.
Open ToolRegistry Hive Explorer Lite
Registry forensicsOpen Windows registry hive files to extract autoruns, USB history and UserAssist artifacts for quick forensic review; CSV export available.
Extract autoruns and USB device history from registry hives in your browser.
Open ToolPE Static Analyzer Lite
Static analysisAnalyze EXE and DLL structure, sections and imports without leaving the browser.
Profile suspicious binaries before deeper reverse engineering.
Open ToolPrefetch Analyzer Lite
Windows artifactInspect Windows Prefetch files locally for execution details, run counts and referenced paths.
Recover execution metadata from .pf artifacts in-browser.
Open ToolYARA Rule Tester Lite
Malware triageTest YARA rules locally against text or files, with no upload required.
Quickly triage suspicious content with custom rules.
Open ToolSQLite Artifact Explorer Lite
SQLite analysisOpen SQLite databases locally and inspect browser/app artifacts, schema and records.
Analyze browser history or app databases without uploading.
Open ToolMobile SQLite Explorer Lite
Mobile app DBsOpen mobile app SQLite databases exported from backups and inspect schema and records locally.
Inspect cookies, history and app databases from mobile backups in your browser.
Open ToolPlist & Protobuf Decoder Lite
Plist & protobufDecode XML and binary plists and inspect small protobuf blobs directly in your browser; upload a WASM parser or .proto schema from the tool UI for fuller decoding.
Quickly preview plist manifests and decode protobuf messages with an uploaded schema or WASM parser.
Open TooliOS Backup Explorer Lite
iOS backupsInspect iOS backup manifests, plists and lightweight metadata locally without uploads.
Review backup manifests and high-level metadata for mobile triage.
Open ToolPCAP Triage Lite
Network triageOpen PCAP files to extract HTTP, DNS and TLS metadata and export findings as CSV for quick network triage.
Extract DNS queries, HTTP requests and TLS SNI for rapid investigation.
Open ToolWhy local analysis matters
Uploading sensitive security data to third-party servers exposes you to unnecessary risk. Logs, hashes and email headers can contain confidential infrastructure details, PII or proprietary information.
DFIR Toolkit processes everything in your browser using standard Web APIs. The results are yours alone.
Who is it for?
SOC Analysts
Quickly triage alerts, extract IOCs and decode timestamps during incident response.
Incident Responders
Analyze email headers, validate file hashes and convert forensic timestamps on the fly.
Security Researchers
A fast workbench for parsing threat data without sending anything to external services.