ShadowTrace is a safe, evidence-based forensic correlation tool for Windows systems.
It reconstructs execution history, inventories files, and identifies suspicious patterns in a transparent, non-invasive, and legal manner.
This tool is intended for administrative auditing and forensic analysis only.Designed for administrative auditing, security research, and fair-play enforcement, providing insights for review and investigation only.
I updated my old version from 2024 and published it
- Navigate to your main Windows drive (usually
C:\). - Go to
C:\Users\<Administrator>(replace<Administrator>with your admin account folder). - Place the
ShadowTrace.ps1script in this folder.
- Right-click PowerShell → Run as Administrator.
- This allows the script to run temporarily.
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
# Press "Yes to All" when prompted.\ShadowTrace.ps1- The script automatically creates an output folder in the same location, for example:
Inset-ShadowTrace_635099da-608e-4f80-a286-d879d938045a - Inside this folder, you will find all generated reports:
forensic_log.txtforensic_findings.txtdrivercheck.txtdatchecker.txtreviewer_notes.txtconfidence_explanation.txtevidence_heatmap.txtLICENSE.txt
This product is proprietary and fully licensed to INSET.
All rights reserved.
Restrictions:
- Do not copy, distribute, sell, or create derivative works from this script.
- Use is limited to legal auditing and forensic review only.
- Always run as administrator for full functionality.
- The tool is non-invasive and does not modify system files or memory.
- Do not move or modify the output folder while the script is running.
- Keep your PowerShell execution policy set to bypass temporarily only for running this tool.
- Review the generated reports carefully—this tool provides insights, not verdicts.
- The evidence heatmap helps visualize suspicious activity over time.
- Copy and paste the following directly into PowerShell:
# Set execution policy temporarily
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
# Run INSETCHECKER
.\ShadowTrace.ps1