BreachSleuth is a local, offline security analyst tool for triaging and analysing leaked datasets — no cloud, no uploads, no exposure.
Built for security analysts who need fast, repeatable, offline-safe investigation workflows.
Recursively scans datasets of any size. Fingerprints files by magic bytes, detects mismatched extensions, and flags protected archives.
Opens ZIP, RAR, 7z, and tar archives automatically. Scans nested files for sensitive content without manual extraction.
Extracts and previews text from PDFs, Word documents, spreadsheets, emails, SQLite databases, and images via OCR.
Deterministic regex-based detection of credentials, PII, financial data, API keys, and confidentiality markers — no LLM required.
Deep-dive analysis using local Ollama models or the Claude API. Ask questions about any file or the entire dataset.
Search with custom keywords or regex across all files. Export findings as HTML reports or CSV inventories.
BreachSleuth is being developed use-case by use-case, with each phase focused on a complete analyst workflow.
Full recursive scan with file fingerprinting, magic byte detection, type mismatch flagging, protected archive detection, and category breakdowns.
Automatic extraction and listing of contents inside ZIP, RAR, 7z, and tar archives. Risk scanning of nested files without manual unpacking.
Per-file content extraction (PDF, DOCX, XLSX, EML, SQLite, OCR), automatic risk scoring with highlighted previews, pattern search with regex support, and HTML/CSV report export.
Deep analysis using local Ollama models or Claude API. Ask questions about individual files or the full dataset. Batch analysis across all scanned files.
Formal incident-ready reports per dataset with executive summary, risk breakdown, findings inventory, and timeline of detected indicators.
Save and resume investigation sessions. Manage multiple cases simultaneously with notes, annotations, and audit history.
One-click installers for macOS and Windows. Offline-capable deployment with no internet dependency.
Breach data is sensitive by definition. BreachSleuth never sends your data anywhere.
Runs entirely on your machine. No cloud connectivity required for scanning, analysis, or reporting.
Integrates with Ollama for on-device AI analysis. Your data never leaves your environment.
Files are read and analysed in place. Nothing is copied, uploaded, or transmitted.
Designed for use in isolated environments. Suitable for sensitive investigations and classified datasets.
BreachSleuth is currently in private beta. Request access for your security team and we'll be in touch.