Heimdall OS v0.9.4
Type 'help' for available commands.
root@heimdall:~#
β˜… 0 stars on GitHub  Β·  Started July 2025 β€” 0 days of development
Active Development β€” v0.9 Beta

HEIMDALL DFIR

A unified investigation cockpit built for CSIRT / SOC / DFIR teams. Ingest, correlate and visualise any forensic source in a real-time interface.

0 GitHub Stars
0 Forks
β€” Days of dev
v0.9 Current version
live-session β€” 00:00:00
analyst@soc:~$ git clone https://github.com/RaiseiX/Heimdall-DFIR.git
Cloning into 'Heimdall-DFIR'...
analyst@soc:~$ cd Heimdall-DFIR && ./start.sh
βœ“ Container stack deployed successfully in 45s.
βœ“ Ready for memory and disk artifact ingestion.
BETA v0.9 Docker Compose Node 18+ React 18 Elasticsearch 8.13 Volatility 3 MIT License YARA Β· Sigma Β· TAXII

How it works

β€” three steps from evidence to report

01

COLLECT

Upload any forensic artifact β€” disk images, EVTX logs, PCAP captures, RAM dumps, registry hives. Heimdall handles chunked upload with automatic resume and ClamAV scanning on every file.

02

ANALYSE

Artifacts are automatically parsed by the worker queue β€” Zimmerman Tools, Hayabusa, tshark β€” and indexed into a per-case Elasticsearch Super Timeline. Triage score computed in real time.

03

HUNT

Run YARA rules, Sigma hunts, correlate with TAXII Threat Intel feeds, map to MITRE ATT&CK, visualise lateral movement, and export a signed PDF report with Legal Hold manifest.

By the numbers

β€” key metrics of the platform

0GBMax RAM dump size
0parsersDisk analysis sources
0rulesTriage engine
0migrationsDB schema
0scoreBeacon detection
0stepsRansomware playbook

Features

β€” what Heimdall brings to your investigations

01 β€”

Forensic Analysis

Super Timeline multi-source via Elasticsearch, Hayabusa Sigma detections on EVTX, full Zimmerman Tools suite, PCAP extraction via tshark. All artifacts parsed asynchronously by the BullMQ worker.

HayabusaMFTECmdRECmdtshark
02 β€”

Memory Forensics SOON

Chunked upload up to 256 GB with automatic resume. Full VolWeb + Volatility 3 integration is currently in development.

VolWebVolatility 3MinIO
03 β€”

Threat Hunting

YARA engine with per-file/per-case scan, Sigma hunt on Super Timeline, GitHub bulk import (Neo23x0, SigmaHQ, Yara-Rules), TAXII 2.1 / STIX 2.1 Threat Intel with automatic post-ingestion correlation.

YARASigmaTAXII 2.1
04 β€”

Automatic Detections

Timestomping ($SIA vs $FN), double extension (.pdf.exe), C2 beaconing score (0-100), persistence via Run Keys / LNK Startup / BITS Jobs / Sigma Hayabusa.

TimestompingC2 BeaconPersistence
05 β€”

Triage & Investigation

Machine triage score (0-100, 16 rules), lateral movement graph (D3.js, Event IDs 4624/4648/4768), MITRE ATT&CK kill chain (14 phases), IOC enrichment via VirusTotal & AbuseIPDB.

MITRED3.jsVirusTotal
06 β€”

SOAR & Automation

Parallel SOAR engine post-ingestion, DFIR Playbooks (Ransomware 11 steps, RDP 10, Phishing 9), Legal Hold with HMAC-SHA256 signed manifest, Sysmon configs bundled.

SOARPlaybooksLegal Hold
07 β€”

Local AI β€” Ollama

Global AI Chat with SSE streaming, Case Copilot with automatic context injection (IOCs, SOAR alerts, artifacts, notes). Supports qwen3, deepseek-r1, mistral.

Ollamaqwen3:14bdeepseek-r1
08 β€”

Security & Admin

ClamAV mandatory scan, DoD 5220.22-M 7-pass hard delete, JWT rotation with Redis blacklist, automatic pg_dump backups, full audit log with HMAC, Docker CPU/RAM monitoring.

ClamAVDoD 5220.22-MHMAC
09 β€”

Collaboration

Live case chat (Socket.io), real-time analyst presence, investigation notes with XSS sanitisation, enriched PDF report (triage, YARA, Threat Intel, kill chain).

Socket.ioPDF ReportReal-time

Parsers & Data Sources

β€” supported artifact types and analysis engines

disk analysis β€” 16 parsersAVAILABLE
ParserArtifactCategory
HayabusaEVTX β€” Sigma detections (critical/high/medium/low)Event Logs
EvtxECmdEVTX β€” Raw Windows event logsEvent Logs
MFTECmd$MFT β€” Master File Table (timestamps, paths, sizes)Filesystem
PECmdPrefetch (.pf) β€” Execution history, DLL dependenciesExecution
LECmdLNK (.lnk) β€” Recent files, volumes, target machinesRecent Activity
SBECmdShellbags β€” Folder navigation historyNavigation
AmcacheParserAmcache.hve β€” Installed & executed programsExecution
AppCompatCacheParserShimCache (SYSTEM) β€” Application executionExecution
RECmdRegistry hives (SAM, SYSTEM, NTUSER.DAT, SOFTWARE…)Registry
JLECmdJump Lists β€” Recent files per applicationRecent Activity
SrumECmdSRUM (SRUDB.dat) β€” Network & CPU usage per processNetwork / CPU
SQLECmdSQLite (.sqlite, .db) β€” Chrome / Firefox / Edge historyBrowser
RBCmdRecycle Bin ($I*) β€” Deleted files, original path & dateDeleted Files
BitsParserBITS (qmgr*.dat) β€” Background transfers, persistencePersistence
tsharkPCAP (.pcap, .pcapng) β€” DNS / HTTP / TLS / TCP flowsNetwork
ClamAVAny file β€” Antivirus scan & quarantineAntivirus
memory analysis β€” Volatility 3 via VolWebCOMING SOON
NOTE β€” Full RAM forensics integration via VolWeb is currently in development.
PluginDescriptionStatus
windows.pslist / pstreeProcess list and treePLANNED
windows.cmdlineCommand-line arguments per processPLANNED
windows.netscan / netstatActive and historical network connectionsPLANNED
windows.dlllistDLLs loaded per processPLANNED
windows.malfindMemory injection detectionPLANNED
windows.svcscanWindows services enumerationPLANNED
additional artifacts β€” plannedCOMING SOON
ArtifactDescriptionCategory
WebCacheV01.datIE / Edge legacy browser cacheBrowser
$LogFile / $UsnJrnlNTFS change journalFilesystem
WMI artifactsWMI persistence β€” subscriptions, filters, consumersPersistence
Thumbcache / IconCacheVisual artifacts β€” accessed images and filesVisual
Disk image mounting.E01, .dd, .vmdk β€” full disk image analysisDisk

Use Cases

β€” illustrative investigation scenarios

IMPORTANT NOTICE β€” These scenarios represent the intended vision of Heimdall DFIR. Not all steps are fully operational in the current beta (v0.9).

RANSOMWARE RESPONSE

01Extract MFT and EVTX logs
02Identify initial access (e.g. EID 4624/4688)
03Trace encryption via SRUM disk usage
04Detect VSSAdmin shadow copy deletion
05Legal Hold export + HMAC manifest

INSIDER THREAT

01Parse NTUSER.DAT Shellbags
02Prove USB directory traversal
03Correlate LNK files with exfiltration
04Analyze SRUM for network bytes sent
05PDF report export

APT INVESTIGATION

01Scan EVTX with Hayabusa Sigma rules
02Detect lateral movement (Pass-the-Hash)
03Run YARA on extracted binaries
04TAXII Threat Intel correlation
05MITRE ATT&CK mapping

100% MITRE ATT&CK Mapped

Heimdall artifacts, parsers and threat hunting rules provide complete visibility across all 14 enterprise tactical phases.

Reconnaissance100%
Techniques10 / 10
Sub-techniques34 / 34
Resource Dev100%
Techniques8 / 8
Sub-techniques31 / 31
Initial Access100%
Techniques9 / 9
Sub-techniques30 / 30
Execution100%
Techniques14 / 14
Sub-techniques18 / 18
Persistence100%
Techniques19 / 19
Sub-techniques52 / 52
Priv Escalation100%
Techniques13 / 13
Sub-techniques39 / 39
Defense Evasion100%
Techniques43 / 43
Sub-techniques135 / 135
Cred Access100%
Techniques17 / 17
Sub-techniques54 / 54
Discovery100%
Techniques32 / 32
Sub-techniques88 / 88
Lateral Movement100%
Techniques9 / 9
Sub-techniques5 / 5
Collection100%
Techniques17 / 17
Sub-techniques37 / 37
Command & Control100%
Techniques16 / 16
Sub-techniques53 / 53
Exfiltration100%
Techniques9 / 9
Sub-techniques13 / 13
Impact100%
Techniques13 / 13
Sub-techniques36 / 36

Security by Design

β€” Heimdall is built to be trusted with sensitive data

Air-gap readyFully operational without internet. Threat Intel feeds are optional.
ClamAV mandatoryEvery uploaded file is scanned before processing. Infected files are quarantined.
DoD 5220.22-M7-pass secure deletion on hard delete. No data remnants.
JWT + Redis blacklistSessions are revocable instantly. Token rotation on every refresh.
HMAC audit logEvery action is logged with an HMAC signature. Tamper-evident.
No telemetryZero data sent externally. Your cases stay on your infrastructure.
Legal HoldHMAC-SHA256 signed manifest for chain of custody and court admissibility.
Automatic backupspg_dump scheduled backups. Restore at any point in time.

Architecture

β€” service topology & data flow

heimdall β€” service map
Browser β”‚ β–Ό [bifrost / nginx :80/:443] ← rate-limit Β· security headers Β· SSL termination β”‚ β”œβ”€β”€β–Ά [asgard / frontend :3000] React 18 Β· Vite Β· D3.js Β· TanStack Table β”‚ └──▢ [odin / backend :4000] Node.js Β· Express Β· TypeScript β”‚ β”œβ”€β”€β–Ά [yggdrasil / postgres :5432] DFIR schema (18 migrations) β”œβ”€β”€β–Ά [hermod / redis :6379] BullMQ queues Β· sessions Β· JWT blacklist β”œβ”€β”€β–Ά [mimir / elasticsearch :9200] Super Timeline (per-case index) β”œβ”€β”€β–Ά [tyr / clamav :3310] Real-time AV scan on every upload └──▢ [huginn / worker] BullMQ consumer (concurrency=2) β”‚ β”œβ”€β”€ Zimmerman Tools PECmd Β· MFTECmd Β· LECmd Β· SBECmd Β· RECmd β”œβ”€β”€ Hayabusa Sigma EVTX scanner └── tshark PCAP parser (DNS Β· HTTP Β· TLS Β· TCP)
docker compose β€” service list
ServiceImagePort(s)Role
bifrostnginx:alpine80 / 443Reverse proxy Β· rate-limit Β· SSL
asgardnode:18-alpine3000React frontend
odinnode:18-alpine4000Express API backend
yggdrasilpostgres:16-alpine5432PostgreSQL β€” DFIR schema
hermodredis:7-alpine6379Redis β€” BullMQ Β· sessions Β· JWT
mimirelasticsearch:8.139200Elasticsearch β€” Super Timeline
tyrclamav:1.43310ClamAV antivirus daemon
huginnnode:18-alpineβ€”BullMQ worker β€” artifact parsing
njordminio/minio9000 / 9001MinIO S3 β€” RAM dump storage
hel-apipython:3.11-slimβ€”VolWeb Django API
hel-workerpython:3.11-slimβ€”Celery β€” Volatility 3 tasks
hel-proxynginx:alpine8888VolWeb reverse proxy (SSO)

Tech Stack

β€” technologies powering Heimdall

FrontendReact 18 Β· Vite Β· D3.js
BackendNode.js 18 Β· Express
QueueBullMQ Β· ioredis
DatabasePostgreSQL 16
CacheRedis 7
SearchElasticsearch 8.13
StorageMinIO (S3 API)
MemoryVolWeb Β· Volatility 3
AntivirusClamAV 1.4.3
HuntingYARA Β· Sigma Β· TAXII
Networktshark (PCAP)
InfraDocker Compose v2

Supported OS

β€” host OS for running Heimdall + analyzed artifact OS

Linux (host)
Ubuntu 22.04 LTS β€” rec.
Debian 12+
Any Docker-compatible
Windows (host)
Windows 10/11 (Docker)
Windows Server 2019+
WSL2 recommended
macOS (host)
macOS 13+ (Docker)
Apple Silicon (M1/M2/M3)
Intel x86_64
Analyzed artifacts
Windows 7 / 8 / 10 / 11
Windows Server 2008–2022
Linux (PCAP, RAM dumps)
system requirements
ComponentMinimumRecommended
RAM8 GB16 GB+
CPU4 cores8 cores+
Disk50 GB SSD200 GB+ NVMe SSD
OSLinux / Windows / macOSUbuntu 22.04 LTS
Docker24.0+latest
Docker Composev2.0+latest
Node.js18.x20.x LTS

Integrations

β€” external tools and services supported

Hayabusa
Sigma EVTX scanner
VolWeb
Memory forensics UI
Volatility 3
RAM analysis engine
Elasticsearch
Super Timeline index
ClamAV
Antivirus scanning
MinIO
S3 artifact storage
VirusTotal
IOC enrichment
AbuseIPDB
IP reputation
SigmaHQ
Sigma rule repository
Neo23x0
YARA rule repository
TAXII 2.1
Threat Intel feeds
Ollama
Local AI models

Tested On

β€” incident types Heimdall has been tested against

RansomwareLockBit Β· BlackCat Β· Ryuk β€” full kill chain reconstruction
RDP Brute ForceLateral movement via Event IDs 4624 / 4648 / 4768
PhishingCredential harvesting Β· macro execution Β· persistence
BITS JobsBackground transfer persistence Β· LOLBin abuse
Living-off-the-LandLOLBins β€” certutil Β· mshta Β· regsvr32 Β· wscript
Insider ThreatData exfiltration via USB Β· cloud sync Β· email

GitHub Activity & Team

β€” latest commits and contributors

Loading contributors...
GitHub Activity β€” RaiseiX/Heimdall-DFIR
Loading commits…

Roadmap

β€” planned releases and milestones

v0.9 CURRENT BETA
Core platform β€” disk analysis, YARA, Sigma, TAXII, SOAR playbooks, Ollama AI, Legal Hold, collaboration
v1.0 PLANNED
Full RAM forensics integration β€” VolWeb + Volatility 3 plugin execution and result display
v1.1 PLANNED
Disk image mounting β€” .E01, .dd, .vmdk support Β· WebCache Β· $UsnJrnl Β· WMI artifacts
v1.2 PLANNED
Extended artifact support β€” Thumbcache Β· ESE databases Β· $I30 Β· Windows Search index
v2.0 VISION
Multi-tenant workspaces Β· Linux artifact analysis Β· macOS forensics Β· API for external integrations

Changelog

β€” recent releases

CHANGELOG.md β€” last entries
v0.9.0β€” 2026
+ Ollama Case Copilot with automatic context injection
+ TAXII 2.1 / STIX 2.1 Threat Intel with post-ingestion correlation
+ Legal Hold β€” HMAC-SHA256 signed manifest
+ C2 beaconing score (0–100) with beacon detection engine
+ SOAR parallel engine β€” Ransomware / RDP / Phishing playbooks
~ Fix chunked upload resume on large RAM dumps
~ Fix Elasticsearch per-case index isolation

v0.8.0β€” 2026
+ YARA bulk import from GitHub (Neo23x0, SigmaHQ, Yara-Rules)
+ Lateral movement graph β€” D3.js (Event IDs 4624/4648/4768)
+ MITRE ATT&CK kill chain (14 phases)
+ Live case chat β€” Socket.io real-time collaboration
~ Fix JWT rotation edge case on concurrent requests

Installation

β€” up and running in minutes

Always use the provided installation script. Do not run docker compose up manually β€” the script handles secret generation, container build and all database migrations automatically.
Linux / macOS β€” bash start.sh
# Clone the repository
$ git clone https://github.com/RaiseiX/Heimdall-DFIR.git
$ cd Heimdall-DFIR
 
# Run the installation script
$ bash start.sh
Windows β€” PowerShell start.ps1
# Clone the repository
> git clone https://github.com/RaiseiX/Heimdall-DFIR.git
> cd Heimdall-DFIR
 
# Run the installation script
> .\start.ps1
Heimdall UI
http://localhost
API
http://localhost:4000
VolWeb
http://localhost:8888
MinIO Console
http://localhost:9001

DFIR Glossary

β€” key terms used in Heimdall

glossary.md
Artifact / TermLocation / TypeForensic Value
$MFTC:\$MFTCore NTFS index. Contains $STANDARD_INFORMATION (0x10) and $FILE_NAME (0x30) timestamps. Crucial for detecting timestomping.
Prefetch (.pf)C:\Windows\Prefetch\Execution evidence. Stores run counts, last 8 execution times, and handles/DLLs loaded within the first 10 seconds.
AmcacheC:\...\Amcache.hveTracks installed/executed applications. Stores SHA1 hashes, full file paths, and first execution timestamps.
ShimCacheSYSTEM\...\AppCompatCacheApplication Compatibility Cache. Stores up to 1024 execution entries, including the Last Modified time of the binary.
ShellbagsNTUSER.DAT\...\BagMRUProves folder access/navigation by a specific user. Works even for deleted directories, USB drives, and network shares.
SRUMC:\...\SRUDB.datSystem Resource Usage Monitor. ESE database tracking 30-day historical network usage (bytes sent/received) and CPU time per process.
EVTX LogsC:\...\winevt\Logs\Windows Event Logs. Key IDs: 4624 (Logon), 4688 (Process Creation with Command Line), 7045 (Service Installation).
LNK Files...\Windows\Recent\Records file/folder access. Contains the Target's MAC address, Volume Serial Number, and Original Path.
Jump Lists...\AutomaticDestinations\Tracks files opened by specific applications pinned to the taskbar. Analyzed via AppIDs.
BITSC:\...\DownloaderBackground Intelligent Transfer Service (qmgr.dat). Legitimate updater service frequently abused by malware for C2 and persistence.
YARADetection EnginePattern matching tool for malware identification based on hexadecimal strings, regular expressions, and byte sequences.
SigmaDetection EngineGeneric signature format for log events (SIEM). Used by Heimdall via Hayabusa to scan EVTX files for malicious behaviors.
TAXII / STIXThreat IntelligenceStandardized JSON format (STIX 2.1) and HTTPS transport protocol (TAXII 2.1) used to ingest and correlate Indicators of Compromise (IOCs).

FAQ

β€” frequently asked questions

Does Heimdall require an internet connection?β–Ό
No. Heimdall is fully air-gap compatible. All analysis is performed locally. VirusTotal, AbuseIPDB and TAXII Threat Intel feeds are optional and can be disabled.
Can I use Heimdall on Windows?β–Ό
Yes. Use start.ps1 on Windows. Docker Desktop with WSL2 is required. All features are supported on Windows, Linux and macOS.
Is Heimdall free?β–Ό
Yes. Heimdall DFIR is released under the MIT License. Free forever. No subscription, no telemetry, no hidden costs.
Is RAM forensics available in v0.9?β–Ό
Partially. Chunked upload of RAM dumps (up to 256 GB) is functional. Full Volatility 3 plugin execution and result display via VolWeb is coming in v1.0.
How do I report a bug?β–Ό
Open an issue on the GitHub Issues tracker with as much detail as possible β€” steps to reproduce, logs, environment (OS, Docker version, browser).

Credits

β€” open-source projects that make Heimdall possible

Share Heimdall

β€” help the project grow

HEIMDALL
ᚺ α›– ᛁ α›— α›ž ᚨ α›š α›š
// The Watcher Awakens
β€” Edmond Locard, Pioneer of Forensic Science
heimdall-shell β€” classified
[ system ] detected user clearance: LEVEL 9 ... OK
[ system ] activating WATCHER EYE interface ... OK
heimdall@asgard:~$ whoami
watcher_of_the_bifrost
heimdall@asgard:~$ status --all
[ βœ“ ] Bifrost Bridge β€” ONLINE
[ βœ“ ] Nine Realms Watch β€” ACTIVE
[ βœ“ ] Gjallarhorn β€” STANDBY
[ βœ“ ] Easter Egg β€” FOUND BY YOU
heimdall@asgard:~$ echo "welcome, investigator"
welcome, investigator
[ forensics ] identified classified data: yggdrasil_watcher.conf ... 100% OK

// keyboard shortcuts

GOpen GitHub
FJump to Features
IJump to Install
PJump to Parsers
TBack to Top
Ctrl+KCommand palette
↑↑↓↓←→←→BA???
ESCClose this panel
↑↑↓↓←→←→BA
// KONAMI CODE ACCEPTED β€” SYSTEM BREACH
OPERATOR :: heimdall-dfir@localhost
CLEARANCE :: LEVEL 9 β€” BEYOND TOP SECRET
STATUS :: all eyes open
MESSAGE :: you found the second easter egg.
 
// Heimdall sees all who approach Asgard.
// And apparently, so do you.
β€” BIFRΓ–ST BRIDGE ACCESS GRANTED β€”
α›’ ᛁ ᚠ ᚱ Γ– α›Š ᛏ