top of page
Search

Browser Forensics Just Got Way Easier — And It's Free

  • 2 days ago
  • 2 min read

Okay let me be real with you for a second.

Browser forensics manually? It's a pain.

You're digging through SQLite databases, remembering artifact locations, writing queries — and if you're doing it with free tools, it only gets worse.


I actually built a full series on how to do this manually if you want to go deep on it — link here:



But today? I found a tool that makes all of that dramatically simpler. And it pairs beautifully with KAPE, which if you know me, you know I love.

-------------------------------------------------------------------------------------------------------


Step 1 — Collect Your Artifacts With KAPE

Before the tool does anything, you need to actually collect the browser artifacts off the system. KAPE handles this perfectly. If you're running PowerShell:



If you prefer the GUI, even easier — just tick WebBrowsers as your target.


-------------------------------------------------------------------------------------------------------


Step 2 — Meet the Tool

Drum roll... 🥁

That's it. That's the tool. And I genuinely love it.


What makes it special? You can run it on Windows, WSL, Linux, or Mac. Doesn't matter where the evidence came from — Mac, Windows, whatever — the tool just reads the SQLite files directly. Cross-platform by nature.


-------------------------------------------------------------------------------------------------------


Running It on Windows

Download the executable, run as Administrator, and you get this menu:




Select 1, point it at your KAPE output folder, choose where you want results saved, hit enter — done.

About a minute later you have a clean Excel output. That's it. No SQL queries, no manual path hunting.


Output! (Analyse all the output with my another favorite tool Timeline explorer)

-------------------------------------------------------------------------------------------------------

What Browsers Does It Support?

-------------------------------------------------------------------------------------------------------


Bonus — Parsing Mac Evidence on WSL

This is where it gets cool. I had a Mac artifact set collected using UAC (Unix Artifact Collector) and I wanted to parse it on Windows via WSL2.

Here's the exact command I ran:


MAC output in excel

-------------------------------------------------------------------------------------------------------

Why I Actually Like This Tool

Look, paid tools like Magnet AXIOM or Cellebrite make this trivial — but they cost money, sometimes a lot of it.

This tool gives you clean Excel output, covers every major browser, runs cross-platform, and pairs with KAPE out of the box.

For anyone doing DFIR on a budget or just learning the craft, this is genuinely one of the best free tools out there right now.


Go try it. You'll get it immediately.

-------------------------------------------------------------------------------------------------------


If this helped — share it, react, drop a comment. More coming.

-----------------------------------------------Dean----------------------------------------------


 
 
 

Ready to discuss:

- Schedule a call for a consultation

- Message me via "Let's Chat" for quick questions

Let's connect!

Subscribe to our newsletter

Connect With Me:

  • LinkedIn
  • Medium

© 2023 by Cyberengage. All rights reserved.

bottom of page