Triage Collections
38 pre-built KAPE compound targets for rapid forensic acquisition
Compound targets combine multiple individual targets into a single collection. Use these for comprehensive triage acquisition with a single KAPE command.
featured collections
SANS_Triage
featuredSANS Triage Collection
KapeTriage
featuredKapeTriage collects most of the files needed for a DFIR Investigation. This Target pulls evidence from File System files, Registry Hives, Event Logs, Scheduled Tasks, Evidence of Execution, SRUM data, SUM data, Cloud metadata, WER, WBEM, Web Browser data (IE/Edge, Chrome, Mozilla history), LNK Files, JumpLists, Notepad unsaved sessions (Win11), 3rd party remote access software logs, 3rd party antivirus software logs, Windows 10/11 Timeline database, and $I Recycle Bin files.
BasicCollection
featuredBasic Collection
EvidenceOfExecution
featuredEvidence of execution related files
all collections (38)
RemoteAdmin
29Composite target for files related to remote administration tools
Antivirus
27Antivirus
SANS_Triage
23SANS Triage Collection
KapeTriage
18KapeTriage collects most of the files needed for a DFIR Investigation. This Target pulls evidence from File System files, Registry Hives, Event Logs, Scheduled Tasks, Evidence of Execution, SRUM data, SUM data, Cloud metadata, WER, WBEM, Web Browser data (IE/Edge, Chrome, Mozilla history), LNK Files, JumpLists, Notepad unsaved sessions (Win11), 3rd party remote access software logs, 3rd party antivirus software logs, Windows 10/11 Timeline database, and $I Recycle Bin files.
WebBrowsers
18Web browser history, bookmarks, etc.
BasicCollection
12Basic Collection
FileExplorerReplacements
12File Explorer Replacements
ProgramExecution
12Program Execution Triage Collection
MessagingClients
11Messaging and communication apps
CloudStorage_All
8Cloud Storage Contents and Metadata
CloudStorage_Metadata
7Cloud Storage Metadata
CombinedLogs
7Collect Event logs, Trace logs, Windows Firewall, PowerShell console logs, and .NET CLR UsageLogs
FileSystem
6File system metadata
P2PClients
6P2P Clients
ServerTriage
6A compound target for gathering artifacts common to servers.
EvidenceOfExecution
5Evidence of execution related files
SOFELK
5SOF-ELK related files of interest
USBDetective
5Collects files that can be input into USB Detective for parsing
VPNClients
5VPN Clients
WSL
5All Windows Subsystem for Linux targets
FTPClients
4FTP Clients
UsenetClients
4Usenet Clients
VirtualBox
4Runs all VirtualBox modules to collect Virtualbox VM config files, logs and Virtual Hard Disks
WebServers
4Logs from all known web server applications and supporting services
CloudStorage_OneDriveExplorer
3OneDrive and other files used with OneDriveExplorer
Exchange
3Exchange Log Files
IRCClients
3IRC Clients
MiniTimelineCollection
3MFT, Registry and Event Logs to generate a mini timeline
NetworkScanner
3Network Scanner Tools
RegistryHives
3System and user related Registry hives
TorrentClients
3Torrent Clients
VMware
3Runs all VMware modules to collect VMware VM config files, logs and Virtual Hard Disks
RecycleBin
2Recycle Bin DataAndInfo
Sophos
1Sophos Data
Symantec_AV_Logs
1Symantec AV Logs
LogMeIn
1LogMeIn Data
ScreenConnect
1ScreenConnect Data (now known as ConnectWise Control)
VNCLogs
1VNC Logs