Private Beta

Triage breach data.
Find what matters.

BreachSleuth is a local, offline tool for security practitioners — scan datasets, score risk, redact PII, and run AI investigation without data leaving your machine.

Request Access

Everything you need to triage a breach

Built for security practitioners who need fast, repeatable, offline-safe investigation workflows.

🗂

Folder Scan & Triage

Recursively scans datasets of any size. Fingerprints files by magic bytes, detects mismatched extensions, and flags protected archives.

📦

Archive Extraction

Opens ZIP, RAR, 7z, and tar archives automatically. Scans nested files for sensitive content without manual extraction.

🔍

Content Extraction

Extracts and previews text from PDFs, Word documents, spreadsheets, emails, SQLite databases, and images via OCR.

⚠️

Automatic Risk Scoring

Deterministic regex-based detection of credentials, PII, financial data, API keys, and confidentiality markers — no LLM required.

🤖

LLM Analysis & Chat

Deep-dive analysis using local Ollama models. Fully offline — no API keys, no cloud. Auto-detects available models.

📄

Pattern Search & Reports

Search with custom keywords or regex across all files. Export findings as HTML reports, CSV inventories, or IOC extracts.

🔒

Privacy Filter

Redact PII from the file preview before you read it, and optionally before it reaches any AI model. Originals are never modified.

💼

Case Management

Save and reload full investigation sessions as portable case files. SQLite-backed storage keeps your work between restarts.

📋

Audit Trail

Every practitioner action — file views, risk changes, AI calls, case saves — is logged with a timestamp. Exportable for compliance and handoff.

High — Credentials, keys, credit cards, SSNs
Medium — PII, emails, phones, addresses, DOBs
Low — Confidentiality markers, hashes, URLs
None — No Findings
breachsleuth — scan results
Scanning /datasets/acmecorp_breach ... Found 14 files across 4 subfolders Filename Risk Patterns Matched ──────────────────────────────────────────────────────── db_backup.sql HIGH Password in config · SSN (US) · Credential Pair (5) credential_dump.zip HIGH AWS Access Key · Credential Pair · Secret/Token breach_notification.eml HIGH Password in config · AWS Access Key · Email Address payment_records.txt HIGH Credit Card (7) · IBAN (2) user_records.csv MEDIUM Email · Phone · DOB · Street Address · UK Postcode internal_report.txt MEDIUM IBAN · IP Address · Confidential Marker config.env HIGH AWS Access Key · Secret/Token · Password in config notes.txt NO FINDINGSScan complete in 1.4s · 8 files · 5 High · 2 Medium · 1 No Findings

What's being built

BreachSleuth is being developed use-case by use-case, with each phase focused on a complete practitioner workflow.

1
Complete

UC1 — Folder Scan & Triage

Full recursive scan with file fingerprinting, magic byte detection, type mismatch flagging, protected archive detection, and category breakdowns.

2
Complete

UC2 — Archive Extraction

Automatic extraction and listing of contents inside ZIP, RAR, 7z, and tar archives. Risk scanning of nested files without manual unpacking.

3
Complete

UC3 — Content Extraction & Risk Highlighting

Per-file content extraction (PDF, DOCX, XLSX, EML, SQLite, OCR), automatic risk scoring with highlighted previews, pattern search with regex support, and HTML/CSV report export.

4
Complete

UC4 — LLM Analysis & Chat

Deep analysis using local Ollama models. Fully offline — no API keys required. Ask questions about individual files or the full dataset. Batch analysis across all scanned files.

5
Complete

UC5 — Reporting & Export

HTML narrative reports, CSV file inventories, and IOC extraction. Export findings to any folder for handoff and record-keeping.

6
Complete

UC6 — Case Management & Persistent Storage

Save and reload full investigation sessions as portable case files. SQLite-backed storage keeps all scan results and triage decisions between restarts.

7
Complete

UC7 — Privacy Filter & Audit Trail

Session-level PII redaction keeps sensitive data out of previews and AI models. Every practitioner action is timestamped and logged to the case database, exportable for compliance.

8
Planned

UC8 — Distribution & Packaging

One-click installers for macOS and Windows. Offline-capable deployment with no internet dependency after initial setup.


Local first. Always.

Breach data is sensitive by definition. BreachSleuth never sends your data anywhere.

🔒

Fully Offline

Runs entirely on your machine. No cloud connectivity required for scanning, analysis, or reporting.

🖥

Local LLM Support

Integrates with Ollama for on-device AI analysis. Your data never leaves your environment.

📁

No Uploads

Files are read and analysed in place. Nothing is copied, uploaded, or transmitted.

Air-Gap Safe

Designed for use in isolated environments. Suitable for sensitive investigations and classified datasets.

🔏

Privacy Filter

Redact PII from the practitioner's view and optionally from AI prompts. Three modes: off, preview-only, or full redaction before any LLM call.


Request beta access

BreachSleuth is currently in private beta. Request access for your security team and I'll be in touch.