Private Beta

Triage breach data.
Find what matters.

BreachSleuth is a local, offline tool for security practitioners. Scan datasets, score risk, redact PII, and run AI investigation without data leaving your machine.

Request Access

Everything you need to triage a breach

Built for security practitioners who need fast, repeatable, offline-safe investigation workflows.

🗂

Folder Scan & Triage

Recursively scans datasets of any size. Fingerprints files by magic bytes, detects mismatched extensions, and flags protected archives.

📦

Archive Extraction

Opens ZIP, RAR, 7z, and tar archives automatically. Scans nested files for sensitive content without manual extraction.

🔍

Content Extraction

Extracts and previews text from PDFs, Word documents, spreadsheets, emails, SQLite databases, and images via OCR.

⚠️

Automatic Risk Scoring

Deterministic regex-based detection of credentials, PII, financial data, API keys, and confidentiality markers — no LLM required.

🤖

LLM Analysis & Chat

Deep-dive analysis using local Ollama models. Fully offline — no API keys, no cloud. Auto-detects available models.

📄

Pattern Search & Reports

Search with custom keywords or regex across all files. Export findings as HTML reports, CSV inventories, or IOC extracts.

🔒

Privacy Filter

Redact PII from the file preview before you read it, and optionally before it reaches any AI model. Originals are never modified.

💼

Case Management

Save and reload full investigation sessions as portable case files. SQLite-backed storage keeps your work between restarts.

📋

Audit Trail

Every practitioner action — file views, risk changes, AI calls, case saves — is logged with a timestamp. Exportable for compliance and handoff.

High — Credentials, keys, credit cards, SSNs
Medium — PII, emails, phones, addresses, DOBs
Low — Confidentiality markers, hashes, URLs
None — No Findings
breachsleuth — scan results
Scanning /datasets/acmecorp_breach ... Found 14 files across 4 subfolders Filename Risk Patterns Matched ──────────────────────────────────────────────────────── db_backup.sql HIGH Password in config · SSN (US) · Credential Pair (5) credential_dump.zip HIGH AWS Access Key · Credential Pair · Secret/Token breach_notification.eml HIGH Password in config · AWS Access Key · Email Address payment_records.txt HIGH Credit Card (7) · IBAN (2) user_records.csv MEDIUM Email · Phone · DOB · Street Address · UK Postcode internal_report.txt MEDIUM IBAN · IP Address · Confidential Marker config.env HIGH AWS Access Key · Secret/Token · Password in config notes.txt NO FINDINGSScan complete in 1.4s · 8 files · 5 High · 2 Medium · 1 No Findings

What's being built

BreachSleuth is being developed use-case by use-case, with each phase focused on a complete practitioner workflow.

1
Complete

UC1 — Folder Scan & Triage

Full recursive scan with file fingerprinting, magic byte detection, type mismatch flagging, protected archive detection, and category breakdowns.

2
Complete

UC2 — Archive Extraction

Automatic extraction and listing of contents inside ZIP, RAR, 7z, and tar archives. Risk scanning of nested files without manual unpacking.

3
Complete

UC3 — Content Extraction & Risk Highlighting

Per-file content extraction (PDF, DOCX, XLSX, EML, SQLite, OCR), automatic risk scoring with highlighted previews, pattern search with regex support, and HTML/CSV report export.

4
Complete

UC4 — LLM Analysis & Chat

Deep analysis using local Ollama models. Fully offline — no API keys required. Ask questions about individual files or the full dataset. Batch analysis across all scanned files.

5
Complete

UC5 — Reporting & Export

HTML narrative reports, CSV file inventories, and IOC extraction. Export findings to any folder for handoff and record-keeping.

6
Complete

UC6 — Case Management & Persistent Storage

Save and reload full investigation sessions as portable case files. SQLite-backed storage keeps all scan results and triage decisions between restarts.

7
Complete

UC7 — Privacy Filter & Audit Trail

Session-level PII redaction keeps sensitive data out of previews and AI models. Every practitioner action is timestamped and logged to the case database, exportable for compliance.

8
Planned

UC8 — Distribution & Packaging

One-click installers for macOS and Windows. Offline-capable deployment with no internet dependency after initial setup.


Local first. Always.

Breach data is sensitive by definition. BreachSleuth never sends your data anywhere.

🔒

Fully Offline

Runs entirely on your machine. No cloud connectivity required for scanning, analysis, or reporting.

🖥

Local LLM Support

Integrates with Ollama for on-device AI analysis. Your data never leaves your environment.

📁

No Uploads

Files are read and analysed in place. Nothing is copied, uploaded, or transmitted.

Air-Gap Safe

Designed for use in isolated environments. Suitable for sensitive investigations and classified datasets.

🔏

Privacy Filter

Redact PII from the practitioner's view and optionally from AI prompts. Three modes: off, preview-only, or full redaction before any LLM call.


Your data. Your file. Your control.

BreachSleuth stores all scan results in a local SQLite database — a single file on your machine. No server, no shared storage, no memory that disappears when you close the app.

💾

Survives Restarts

Close the app and reopen it — your scan results, triage decisions, and audit log are all still there. Nothing is held in memory.

📦

Portable

The database is a single .db file. Copy it, back it up, or move it to another machine. Your investigation travels with it.

🗂

Evidence-Ready

A file on disk can be retained, submitted, or reviewed as part of an investigation record. Suitable for formal IR engagements.

🔀

Multiple Cases

Point the database location at a different file to switch between investigations without data mixing. Each case is fully isolated.

📍

Controlled Location

You choose exactly where the data file lives — local drive, encrypted volume, or network share. Critical for air-gapped and classified environments.

🛡

No Data Loss on Crash

Every scan result is written to disk immediately. If the app crashes mid-investigation, nothing is lost — reopen and continue.


Request beta access

BreachSleuth is currently in private beta. Request access for your security team and I'll be in touch.