Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy Check

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

PERSONA
Freelance Consultant
CATEGORY
Freelance
ENDPOINTS
6 used
UPDATED
April 2026
USE CASE · FREELANCE CONSULTANT

DFIR toolkit for the freelance consultant

Independent DFIR and IR consultants need enterprise-grade tooling on an independent-consultant budget. DFIR Platform packages multi-source IOC enrichment, file triage, exposure scanning, and AI-assisted report writing behind one self-serve API key — from $29/month, no annual contract, commercial use permitted.
Create a free account (100 credits/mo)Try /ioc-check and /file-analyzer — no signup
KEY TAKEAWAYS
  1. 01One API key replaces six commercial TI subscriptions that each demand an annual contract and minimum seats.
  2. 02Commercial usage is explicitly permitted on every paid tier — unlike the free tiers of most TI vendors.
  3. 03Starter ($29) fits occasional engagements; Professional ($99) covers full-time solo practice; Enterprise kicks in past ~10,000 credits/month.
01·CONTEXT
01
CONTEXT

Freelance DFIR is priced out of enterprise tooling

A solo or small-firm DFIR consultant juggles two opposing pressures. Clients expect the same quality of investigation a Mandiant or CrowdStrike team delivers — multi-source reputation, sandboxing, attack-surface review, a polished written report. But commercial TI and sandboxing vendors sell on annual contracts with minimum seat counts, and their free tiers explicitly forbid use in paid engagements. The math stops working below about 10 retained clients.
PAIN POINTS
  1. 01VirusTotal Enterprise, Recorded Future, Intel 471: annual contracts, 5-figure minimums, no month-to-month option.
  2. 02Free tiers of VT / AbuseIPDB / urlscan explicitly prohibit commercial use — unusable in paid engagements.
  3. 03Sandboxing vendors (Joe, Any.Run, Hybrid Analysis pro) each sell separate seats, doubling or tripling the monthly spend.
  4. 04Report writing still happens in Word at 11pm on a Friday — nothing in the stack helps turn raw findings into a client-readable narrative.
The reality
“VirusTotal Enterprise, Recorded Future, Intel 471: annual contracts, 5-figure minimums, no month-to-month option.”
02·CAPABILITIES
02
CAPABILITIES

The endpoints that solve it

DFIR Platform unifies the capabilities a consultant actually reaches for — reputation enrichment, file triage, exposure assessment, AI summarization — behind one API key with month-to-month billing and explicit commercial-use permission. Pay $29 or $99, run the engagement, expense it to the client. No seat counts, no annual lock-in, no compliance gymnastics over commercial-use clauses.

Multi-source IOC enrichment

3 credits / IOC
POST /v1/enrichment/lookup

Drop the IOC list from your engagement evidence (pcap, EDR export, firewall log) into one call. Each indicator gets a normalized verdict from up to 11 sources per IP, 8 per domain/URL, 6 per hash — the same set you'd get from six separate vendor logins.

File triage (fast)

5 credits
POST /v1/file/analyze

Upload a suspicious binary or document. Returns hash reputation across engines, PE / macro / OLE analysis, extracted strings, and a risk verdict. Fast enough to run on every attachment from a BEC investigation.

File triage (deep / sandboxed)

25 credits
POST /v1/file/deep

Dynamic analysis for the binaries that matter. Use it on the one or two samples per engagement that warrant full sandbox detonation — not on everything.

AI triage summary for the client report

10 credits
POST /v1/ai/triage

Feed the combined enrichment + file analysis JSON in, get a client-readable paragraph out. Drops straight into the Executive Summary section of your report template.

AI threat-actor profile

20 credits
POST /v1/ai/threat-profile

Given the TTPs and indicators you've assembled, produce a narrative on the likely threat actor / campaign — MITRE ATT&CK mapping, historical context, recommended containment. The 'Attribution and Context' section of the report writes itself.

Public exposure scan (optional service line)

10 credits
POST /v1/exposure/scan

Offer attack-surface assessments as a $X fixed-fee service. One call per client domain, a clean report of open ports, exposed services, and TLS posture to hand over.

03·WORKFLOW
03
WORKFLOW

The per-engagement workflow

A typical engagement: scope call, evidence collection, IOC extraction, enrichment + file triage, AI-assisted report draft, human review, deliverable. DFIR Platform slots into steps 3–5. Below is the minimal curl sequence a consultant runs against their working set — paste it into a per-engagement Jupyter notebook or a shell script and it is reproducible across clients.
$ dfir-lab run freelance-dfir-consultant
# 1. Enrich every IOC you extracted from the evidence
curl https://api.dfir-lab.ch/v1/enrichment/lookup \
  -H "Authorization: Bearer $DFIR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "indicators": [
      { "type": "ip",     "value": "45.155.205.x" },
      { "type": "domain", "value": "c2-lookalike.tld" },
      { "type": "hash",   "value": "e3b0c4429..." }
    ]
  }'

# 2. Triage the one binary that matters (sandbox)
curl https://api.dfir-lab.ch/v1/file/deep \
  -H "Authorization: Bearer $DFIR_API_KEY" \
  -F "file=@suspicious_payload.bin"

# 3. Turn the combined findings into a client-report paragraph
curl https://api.dfir-lab.ch/v1/ai/threat-profile \
  -H "Authorization: Bearer $DFIR_API_KEY" \
  -H "Content-Type: application/json" \
  -d @engagement_findings.json
One key, three calls, one engagement — reproducible across clients without per-vendor credentials.
  1. 01
    Step 01

    Scope and collect

    Client onboarding, evidence ingest (logs, pcap, disk image, email exports). No API usage yet — the platform enters at the analysis stage.

  2. 02
    Step 02

    IOC enrichment pass

    Batch every extracted indicator through /v1/enrichment/lookup. One call per batch of ~20 IOCs keeps API usage linear and easy to budget against the engagement fee.

  3. 03
    Step 03

    File triage

    Run /v1/file/analyze on every suspicious artifact. Reserve /v1/file/deep for the 1–2 samples where dynamic analysis actually changes the verdict.

  4. 04
    Step 04

    AI-assisted report drafting

    Feed the combined JSON into /v1/ai/triage (per-incident summary) and /v1/ai/threat-profile (attribution narrative). The output is a draft, not a deliverable — review, edit, sign your name.

  5. 05
    Step 05

    Deliver and expense

    Month-to-month billing means the $29 or $99 API spend sits on a single invoice you can expense back to the client's engagement fee, cleanly.

04·PRICING
04
PRICING

Pricing that tracks your workload

A consultant running 2–3 engagements a month, moderately sized, fits comfortably in Starter. A full-time solo practice with weekly engagements and AI-heavy report drafting should plan for Professional. If you're running dozens of binaries through /file/deep or enriching thousands of IOCs per engagement, Enterprise starts winning — be honest about that threshold before you commit.
Recommended tier
Starter
500 credits / month
Entry price
$29/mo
  1. 01

    Occasional engagements — 3 small cases/month

    3 × (40 IOCs × 3 cr + 2 files × 5 cr + 1 AI triage × 10) = 3 × (120 + 10 + 10) = 420 credits/month
    Fits Starter ($29, 500 credits) with ~80 credits of headroom — the right tier for someone booking a few engagements per month.
  2. 02

    Full-time solo practice — 6 engagements/mo, mixed depth

    6 × (60 IOCs × 3 + 4 × 5 + 1 deep × 25 + 1 triage × 10 + 1 profile × 20) = 6 × (180 + 20 + 25 + 10 + 20) = 6 × 255 = 1,530 credits/month
    Fits Professional ($99, 2,500 credits) comfortably, with room for ad-hoc exposure scans on client domains.
  3. 03

    Heavy IR retainer — 10 engagements/mo with deep analysis

    10 × (100 IOCs × 3 + 5 × 5 + 3 deep × 25 + 2 triages × 10 + 1 profile × 20) = 10 × (300 + 25 + 75 + 20 + 20) = 10 × 440 = 4,400 credits/month
    Beyond Professional (2,500) — Professional + a 5,000-credit top-up works, but at this volume Enterprise's unlimited-usage pricing becomes more economical. Talk to sales.
05·GET STARTED
05
GET STARTED

Three ways to evaluate

Pick the path that matches your stage. No sales call, no credit card required.

Create a free account (100 credits/mo)

Full API access, dashboard, and your own credits. Includes everything the free tier offers.

Sign up

Try /ioc-check and /file-analyzer — no signup

Paste IOCs at /ioc-check or drop a binary into /file-analyzer in the browser. Rate-limited but free — useful for confirming response quality on a real piece of engagement evidence before you wire the API into a scripted workflow.

Open tool

API reference

Full schema, error codes, rate limits, and copy-ready code snippets for every endpoint referenced above.

Read docs
06·FAQ
06
FAQ

Frequently asked

Q / 01
Is commercial use actually permitted on paid tiers?
Yes. Starter, Professional, and Enterprise all explicitly permit use in paid client engagements — that is the whole point of those tiers. The Free tier (100 credits/month) is intended for evaluation and personal research. If your engagement letter requires a written commercial-use confirmation, Professional and above get one on request.
Q / 02
Can I expense the subscription back to clients?
Most consultants either absorb the $29–$99/mo into overhead or line-item it on the engagement invoice as 'threat intelligence platform access'. Either works — the platform's month-to-month billing and itemized invoices make client-side reimbursement straightforward. Enterprise can invoice per-client if you manage multiple retained accounts.
Q / 03
How do I isolate one client's data from another?
On self-serve tiers, all usage accrues to your single organization account — evidence and IOCs you submit are processed in-memory for the request and the derived artifacts (verdict, indicator history) are persisted under your org. Per-client sub-organizations with isolated history are an Enterprise feature. For most solo consultants, the self-serve model + local engagement folders is the sanctioned pattern.
Q / 04
Is the AI output good enough to put in a client deliverable?
Treat it as a draft, never as a deliverable. The /v1/ai/triage and /v1/ai/threat-profile endpoints produce structured narratives grounded in the JSON you feed them — they are excellent for turning raw findings into a readable first draft, but human review, fact-checking, and signoff are non-negotiable. The time savings come from not starting from a blank page.
Q / 05
What if my engagement volume spikes?
Credit top-ups are available on Starter and Professional — the common pattern is Professional + a 5,000-credit top-up for a heavy month. Past roughly 10,000 credits/month of sustained usage, Enterprise's unlimited-usage pricing beats top-ups on unit economics.
Q / 06
Can I run this air-gapped for classified engagements?
Self-serve tiers are SaaS only. Air-gapped / on-premise deployment is an Enterprise feature. If you handle government or defense work under FedRAMP / IL-level constraints, get in touch before scoping the engagement.
RELATED · INDEX

Other teams solving adjacent problems

01
ADJACENT USE CASE

IOC Enrichment for Incident Response

IR Consultant
02
ADJACENT USE CASE

Automated Phishing Triage for SOC Teams

SOC Analyst
03
ADJACENT USE CASE

Exposure Monitoring for MSSPs

MSSP
Ready when you are

Stop triaging by hand.

Create a free account — 100 credits per month, no credit card. Or keep browsing to find the use case that matches your workflow.

Browse all use casesCreate free account