Kroll Artifact Parser and Extractor (KAPE)


Kroll Artifact Parser And Extractor (KAPE)

Find, collect and process forensically useful artifacts in minutes.

Download KAPE

KAPE Training  |  KAPE Enterprise License  |  KAPE Resources |  Events


/en-ca/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kape /-/media/kroll/images/banners/services/jpg/desktop/cyber-risk.jpg service
Tailored to Your Compliance Program
Screening and Monitoring
Due Diligence Reports
Workflow Automation

Kroll's Artifact Parser and Extractor (KAPE) – created by Kroll senior director and three-time Forensic 4:cast DFIR Investigator of the Year Eric Zimmerman – lets forensic teams collect and process forensically useful artifacts within minutes. With KAPE, you can find and prioritize the most critical systems to your case and collect key artifacts before imaging. This means no longer having to wait until full system images are gathered and then wading through data where typically less than 10% will have any forensic value.

"The gist of [KAPE] is that in as little as half an hour, we can go from disk imaging to substantive analysis of filesystem, shell, execution, event, and registry data."
Troy Larson, Microsoft

How KAPE Works

Introducing KAPE

Over 60 Predefined Targets and 90 Modules

KAPE has two primary phases – target collection and module execution:

  • Targets are essentially collections of file and directory specifications.
  • Modules are used to run programs, which can target anything, including files collected via targets as well as any other kinds of programs you may want to run on a system from a live response perspective.

KAPE gives you access to targets and modules for the most common operations required in forensic exams, helping investigators gather a wider range of artifacts in a fraction of the time, enriching evidentiary libraries.


Grouping Artifacts Expedites Triage

KAPE focuses on collecting and processing relevant data quickly, grouping artifacts in categorized directories such as EvidenceOfExecution, BrowserHistory and AccountUsage. Grouping things by category means an examiner no longer needs to know how to process prefetch, shimcache, amcache, userassist, etc., as they relate to evidence of execution artifacts.

Standardize Forensic Processes

When handling an incident, forensic examiners are tasked with knowing which artifacts to collect, where they may reside, and how to collect the data without damaging the evidence or chain of custody. With KAPE, forensic examiners have a solution to find, collect and process forensic artifacts in a way that standardizes forensic engagements by leveraging a wider range of extracted artifacts. KAPE can also help facilitate the onboarding and training of new investigators by standardizing and scaling artifact pulls.

Live KAPE Training with Kroll Experts

Eric Zimmerman and a team of Kroll experts structured a hands-on course to lead forensic examiners to KAPE mastery, enabling federal agents, law enforcement personnel, first responders, digital forensic analysts and incident response team members to:

  • Understand the myriad applications of KAPE targets and modules
  • Explore the capabilities of KAPE’s graphical interface
  • Run a hands-on investigation lab to produce actionable intelligence in 15 minutes or less
  • Browse KAPE Training packages

Virtual KAPE Training and Certification Events

Kroll is now offering KAPE Virtual Intensive Training and Certification programs online. See below for a list of the upcoming events, more will be announced soon:

  • North America – April 13, 2021 and June 17, 2021
  • EMEA – June 3, 2021
  • APAC – June 30, 2021


Register now.

Continually Evolving Dynamic Solution 

Kroll works on some of the most complex and highest profile cyber incidents in the world and performs digital forensics and evidence collection for thousands of companies. This unique frontline insight from our experts is enhanced by input from the global DFIR community to actively contribute to the development of KAPE. To learn more:


Clarifying KAPE Usage Permission
  • KAPE is free for any local, state, federal or international government agency.
  • KAPE is free for educational and research use.
  • KAPE is free for internal company use.
  • KAPE requires a enterprise license when used on a third-party network and/or as part of a paid engagement.

Read more about KAPE enterprise licenses here.

Download KAPE

This field is required
This field is required
This field is required
This field is required
This field is required A valid email address is required
Please select an Option
This field is required
We will use this information to respond to your inquiry and process your data in accordance with our privacy policy.


Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk

24x7 Incident Response

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Response

Data Recovery Forensic Analysis

Evidence handling with sound methodology, recovery tools and processes supported by case law.

Data Recovery Forensic Analysis

Cyber Litigation Support

Expert witnesses on any cyber topic including forensic data collection and analysis.

Cyber Litigation Support



Cyber Risk


KAPE Quarterly Update – Q1 2021


The State of Incident Response

Digital Forensics

Introducing KAPE – Kroll Artifact Parser and Extractor

Digital Forensics


KAPE Intensive Training and Certification Live Webcast Sessions