Broń Vault is an open-source stealer logs dashboard designed to simplify the process of analyzing stealer log data.
💡 If you're new to this concept, we recommend reading our introductory article on our blog: 'Stealer Logs: Perspectives on Attack and Defense in a Silent Epidemic, and How Broń Vault Automates the Parsing Process'.
Forget complex ad-hoc scripts. With Broń Vault, you can simply drag and drop .zip log files into the web interface. The application automatically parses the data and presents it in a structured format, ready for inspection.
Our goal is to support the day-to-day needs of security teams on the front lines by providing a practical alternative to manual scripting or overly complex platforms typically required for stealer log analysis. This project reflects our mission to democratize security, making foundational analysis capabilities accessible to everyone and allowing analysts to focus on critical decision-making instead of manual log parsing.
⚠️ Note: This tool was developed as a side project and is not intended for production use. Please see the Important Notice section below.
-
File Upload & Processing: Upload
.zipfiles containing common stealer log formats with real-time upload progress tracking and detailed logging. -
Advanced Search: Instantly find credentials and pivot to the full context of the breach.
- Search by specific email addresses or entire domains across all logs.
- A successful match reveals a "Supporting Files" tab with all data from the same device.
- Seamlessly explore correlated cookies, browser history, and system files in a single click.
-
Statistical Dashboard: Get a strategic overview of the data through clear visualizations, including:
- Total domains and URLs (including IPs)
- Total credentials
- Total files extracted
- Top 5 most common passwords
- Top 10 TLDs
- Top 10 most affected browsers
- Top 10 most used software
-
Debug-Zip Utility: Perform a quick check on
.zipfiles to analyze their internal structure, ensure they match supported formats, and flag directories missing a password file. -
Simple RSS Feeds: Integrated RSS feeds from ransomware.live and malware-traffic-analysis.net to keep you updated on the latest threats.
- This tool was built with a focus on functionality, not hardened security. Do NOT deploy this in production environment or expose it to public networks. Use it exclusively in a secure, isolated environment.
- Broń Vault was developed by Tomi Ashari and YoKo Kho as a side project under the ITSEC Asia RnD Division, with support from AI-assisted tooling. It does not represent our commercial IntelliBroń Threat Intelligence platform, though it reflects some similar capabilities.
Follow these steps to get Broń Vault up and running locally.
- Node.js & npm
- MySQL (or use Docker for an easier setup)
This application has been successfully tested on the following operating systems:
- Ubuntu 24.04 LTS
- macOS Sequoia 15.2
- Windows 11 Pro
-
Clone this repository:
git clone https://github.com/your-username/bron-vault.git cd bron-vault -
Install dependencies:
npm install
-
Configure the Environment:
- Copy
.env.exampleto.env.local. - Update
.env.localwith your MySQL database connection details.
- Copy
-
Run the development server:
npm run dev
Once the server is running, perform this one-time setup:
- Open
http://localhost:3000in your browser. - The app will automatically detect that no users exist and will direct you to create an account.
- Create your first administrator account.
- Log in with your newly created credentials.
You are now ready to start using Broń Vault!
If you'd like to improve the project, whether by contributing code or reporting issues and security findings, your feedback is always welcome.



