Broń Vault is an open-source stealer logs dashboard designed to simplify the process of analyzing stealer log data.
💡 If you're new to this concept, we recommend reading our introductory article on our blog: 'Stealer Logs: Perspectives on Attack and Defense in a Silent Epidemic, and How Broń Vault Automates the Parsing Process'.
Forget complex ad-hoc scripts. With Broń Vault, you can simply drag and drop .zip log files into the web interface. The application automatically parses the data and presents it in a structured format, ready for inspection.
Our goal is to support the day-to-day needs of security teams on the front lines by providing a practical alternative to manual scripting or overly complex platforms typically required for stealer log analysis. This project reflects our mission to democratize security, making foundational analysis capabilities accessible to everyone and allowing analysts to focus on critical decision-making instead of manual log parsing.
⚠️ Note: This tool was developed as a side project and is not intended for production use. Please see the Important Notice section below.
-
File Upload & Processing: Upload
.zipfiles containing common stealer log formats with real-time upload progress tracking and detailed logging. -
Advanced Search: Instantly find credentials and pivot to the full context of the breach.
- Search by specific email addresses or entire domains across all logs.
- Combine terms with OR (
,), AND (+), or NOT (-) for more precise queries. - A successful match reveals a "Supporting Files" tab with all data from the same device.
- Seamlessly explore correlated cookies, browser history, and system files in a single click.
-
Device Detail View: Explore individual device information with comprehensive details.
- Overview Tab: Get an at-a-glance summary with engaging visualizations including:
- Summary cards showing total credentials, software, and files
- Device overview with key system information (OS, CPU, GPU, RAM, etc.)
- Top passwords visualization (polar area chart)
- Top domains distribution (horizontal bar chart)
- File size distribution analysis
- Host Information Tab: View detailed system information extracted from logs of multiple stealer families
- User Credentials Tab: Browse all credentials associated with the device
- Software Installed Tab: See all installed software detected on the device
- Files Tab: Explore the complete file structure with tree viewer
- Overview Tab: Get an at-a-glance summary with engaging visualizations including:
-
Asset Discovery: Search for subdomains, paths, and associated credentials for any domain across all uploaded logs.
- Enter a
domainorkeywordto discover all related subdomains, paths, and exposed credentials. - Overview Tab:
- Timeline visualization showing when credentials were logged by stealers (log-date tracking).
- Top 10 most-used passwords observed for the queried domain or keyword.
- Top 10 subdomains by credential volume with horizontal bar charts.
- Top 10 paths by credential volume with horizontal bar charts.
- Summary statistics showing total subdomains, paths, credentials, and affected devices.
- Subdomains Tab: Browse all discovered subdomains with associated paths and credential counts. Includes deduplication feature that aggregates subdomains for clearer insights, automatically summing credential counts when multiple paths exist for the same subdomain.
- Credentials Tab: View all credentials associated with the domain, including URLs, usernames, passwords, log dates, and direct links to correlated devices.
- Enter a
-
Statistical Dashboard: Get a strategic overview of the data through clear visualizations, including:
- Total domains and URLs (including IPs)
- Total credentials
- Total files extracted
- Top 5 most common passwords
- Top 10 TLDs
- Top 10 most affected browsers
- Top 10 most used software
- Country heatmap: World map showing compromised devices by country for geographic insight at a glance.
-
Domain Monitoring: Watch domains of interest and get notified when new uploads contain matching credentials or URLs.
- Define monitors with one or more domains and match by credential (email/username), URL, or both.
- Attach webhook endpoints (e.g. Slack, custom APIs) to each monitor to receive alerts with device and match details.
- View alert history and webhook delivery status in the Domain Monitoring UI.
-
S3-Compatible Object Storage: Store uploaded files in object storage instead of the local filesystem.
- Supports AWS S3, MinIO, and any S3-compatible service; optional MinIO service is included in the Docker setup.
- Configure endpoint, bucket, and credentials in Settings → Storage; optionally migrate existing local files to S3 in one go.
-
Debug-Zip Utility: Perform a quick check on
.zipfiles to analyze their internal structure, ensure they match supported formats, and flag directories missing a password file. -
Roles: Two built-in roles for access control.
- Admin: Full access — upload data, manage settings, users, domain monitors and webhooks, audit logs, and API keys.
- Analyst: Read and search access — dashboard, search, device and domain discovery; cannot upload, change settings, or manage users/monitors.
-
API (v1): REST API with API-key auth for search, lookup, and upload.
- Create and manage API keys in the API Keys page; each key has a role (admin or analyst) and optional rate limit and expiry.
- Search:
GET /api/v1/search/credentialsandGET /api/v1/search/domainfor credential and domain/keyword search. - Upload:
POST /api/v1/upload(admin keys only) with async job tracking viaGET /api/v1/upload/status/{jobId}.
- This tool was built with a focus on functionality, not hardened security. Do NOT deploy this in production environment or expose it to public networks. Use it exclusively in a secure, isolated environment.
- Broń Vault was developed by Tomi Ashari and YoKo Kho as a side project under the ITSEC Asia RnD Division, with support from AI-assisted tooling. It does not represent our commercial IntelliBroń Threat Intelligence platform, though it reflects some similar capabilities.
Broń Vault now features ClickHouse integration to dramatically accelerate analytics queries and domain searches. With ClickHouse's columnar storage and MaterializedMySQL replication, complex queries that previously took seconds now complete much faster, enabling real-time exploration of large datasets.
Automatic Data Synchronization: ClickHouse automatically replicates data from MySQL through MaterializedMySQL. Once configured, every change in MySQL is synced to ClickHouse in real-time (no manual steps required). You can focus on analytics while the system handles all synchronization behind the scenes.
💡 And don't worry about the complexity! We've created a complete Docker service setup that handles all the configuration automatically. Just run a single script, and everything -> MySQL, ClickHouse, MaterializedMySQL replication, and the Next.js application, will be set up and ready to use.
Follow these steps to get Broń Vault up and running locally.
- Docker and Docker Compose v2 installed and running
- Docker Desktop: Download here
- Linux (Ubuntu): Use
./install_docker.shor install:docker-ce+docker-compose-plugin
- Git (for cloning the repository)
This application has been successfully tested on the following operating systems:
- Ubuntu 24.04 LTS (Desktop and Server)
- Kali Linux 2025.3
- macOS Sequoia
-
Clone this repository:
git clone https://github.com/ITSEC-Research/bron-vault cd bron-vault -
Configure the Environment:
# Copy the example environment file cp .env.example .env # Edit .env with your secure passwords # IMPORTANT: Change all default passwords for security! -
Start all services:
For Linux/macOS: Run the script with or without elevated privileges, depending on your Docker setup:
bash docker-start.shAs a note, this script will:
- Build Docker images (only on the first run)
- Start MySQL, ClickHouse, and the Next.js application
- Run the setup script to configure MaterializedMySQL replication
- Display service status and access URLs
-
Access the application:
Open your browser and navigate to:
http://localhost:3000
After the first startup, you can log in with:
- Email:
admin@bronvault.local - Password:
admin
⚠️ Security Note: Please change the default password immediately after first login!
Once all services are running, you can access:
- Bron Vault App: http://localhost:3000
- ClickHouse Play: http://localhost:8123/play
- MySQL: localhost:3306
- ClickHouse HTTP API: http://localhost:8123
Check service status:
# Linux/macOS
./docker-status.sh
# View logs:
docker compose logs -f
Stop all services:
docker compose down
Restart services:
docker compose restart
The first time you start the services:
-
The setup script will automatically:
- Create MySQL replication user for ClickHouse sync
- Configure MaterializedMySQL database in ClickHouse
- Initialize all database tables and indexes
-
Wait for all services to be ready (usually about 60 seconds)
-
Access the application at
http://localhost:3000and log in with the default credentials above -
Important: Change the default password immediately after first login
You are now ready to start using Broń Vault! Just upload the stealer logs, and it will automatically parse them.
If you want code changes to be reflected immediately without rebuilding Docker (as with npm run dev), run only the infrastructure in Docker and the Next.js app on your machine:
-
Start only MySQL, ClickHouse, MinIO, and setup (no app container):
npm run docker:infraOr:
bash docker-start-infra.sh -
Configure local env so the app can reach the containers on localhost:
cp env.local.example .env.local- Edit
.env.local: setDATABASE_URLand ensureMYSQL_HOST=127.0.0.1,CLICKHOUSE_HOST=http://127.0.0.1:8123. - Use the same
MYSQL_USER,MYSQL_PASSWORD,MYSQL_DATABASEand other values as in your.env.
- Edit
-
Install dependencies (if not already done):
npm install -
Run the app locally (hot reload):
npm run devOpen http://localhost:3000. MySQL (3306), ClickHouse (8123), and MinIO (S3 API 9001, Console 9002) stay in Docker; only the app runs locally so changes apply instantly.
If you'd like to improve the project, whether by contributing code or reporting issues and security findings, your feedback is always welcome.







