Skip to content

Latest commit

 

History

History
177 lines (130 loc) · 9.25 KB

README.md

File metadata and controls

177 lines (130 loc) · 9.25 KB

PowerShell-Hunter 🎯

PowerShell-Hunter Logo


Hunt smarter, hunt harder

License PowerShell PowerShell Hunter HuntSmarter

About PowerShell-Hunter

PowerShell-Hunter is a growing collection of PowerShell-based threat hunting tools designed to help defenders investigate and detect malicious activity in Windows environments. This project aims to provide security analysts with powerful, flexible tools that leverage PowerShell's native capabilities for threat hunting.

Current Tools - Season 1

🔍 PowerShell 4104 Event Analysis

PowerShell is both a powerful administrative tool and a favorite weapon for attackers. While its extensive logging capabilities are great for security, the sheer volume of logs can be overwhelming. The PowerShell 4104 Event Analyzer helps defenders cut through the noise and focus on what matters.

Key Benefits:

  • 🔍 Smart Pattern Detection: Pre-configured patterns catch common attack techniques
  • 📊 Risk Scoring: Prioritize investigation with weighted scoring system
  • 🚀 Performance Optimized: Efficiently process thousands of events
  • 📝 Flexible Output: Export to CSV or JSON for further analysis
  • 🛠 Extensible: Easy to add custom detection patterns

➡️ Learn more about PowerShell 4104 Event Analysis ⬅️

🛡️ Active Directory Threat Hunting

A comprehensive tool for detecting and analyzing suspicious activities in Active Directory environments. Features real-time detection of password sprays, brute force attempts, and account lockouts with advanced timing analysis.

Key Features:

  • 🚨 Attack Detection: Identify password sprays, brute force, and suspicious patterns
  • Smart Analysis: Timing-based detection and pattern recognition
  • 📊 Visual Reporting: Detailed timelines and attack pattern visualization
  • 🧪 Test Framework: Built-in simulation tools for testing and validation
  • 🔄 Flexible Collection: Support for WinRM and RPC-based event collection

➡️ Learn more about AD Threat Hunting ⬅️

🔄 MRU (Most Recently Used) Analysis

A powerful tool for extracting and analyzing Windows Registry MRU entries to reveal user activity patterns and potentially suspicious file access. Provides deep visibility into recently accessed files and applications.

Key Features:

  • 🔍 Deep Registry Analysis: Extract MRU data from multiple registry locations
  • 📂 PIDL Decoding: Parse complex binary structures for full file paths
  • ⏱️ Chronological Tracking: Order events by access time
  • 🎯 Smart Detection: Identify suspicious file access patterns
  • 📊 Multiple Output Formats: Export findings in various formats
  • 🔄 Comprehensive Coverage: Track both files and applications

➡️ Learn more about MRU Analysis ⬅️

📊 BAM (Background Activity Moderator) Analysis

A forensics utility that extracts and analyzes Windows BAM data to track application execution history and establish user activity timelines. Essential for incident response and digital forensics.

Key Features:

  • 🕒 Timeline Analysis: Track application execution times
  • 👤 User Activity Mapping: Correlate actions with users
  • 🔍 Signature Verification: Validate process authenticity
  • 📊 Multiple Export Options: CSV, JSON, and HTML reports
  • 🎯 Pattern Detection: Identify suspicious execution patterns
  • 🔄 Cross-System Correlation: Link activities across systems

➡️ Learn more about BAM Analysis ⬅️

🔍 PCA (Program Compatibility Assistant) Analysis

A PowerShell script that parses and analyzes Program Compatibility Assistant (PCA) logs from Windows systems. This tool helps forensic analysts and threat hunters investigate application execution history and identify potential compatibility issues.

Key Features:

  • 🕒 Execution History: Track application execution with accurate timestamps
  • 🚨 Event Detection: Identify process events and abnormal program exits
  • 📊 Multiple Export Options: HTML, CSV, and JSON reports
  • 📈 Summary Statistics: Quick overview of PCA activity
  • 🔄 Interactive Reports: Visually appealing HTML reports with interactive elements
  • 🎯 Forensic Analysis: Reconstruct application execution timelines

➡️ Learn more about PCA Analysis ⬅️

🔎 UserAssist Registry Analysis

A powerful PowerShell forensic tool designed to extract, decode, and analyze UserAssist registry keys in Windows systems. These keys maintain a record of application executions and user interactions, making them invaluable for digital forensics, incident response, and user activity tracking.

Key Features:

  • 🔍 ROT13 Decoding: Automatically decodes obfuscated registry entries
  • 📊 Execution Tracking: Reveals application usage patterns and frequency
  • ⏱️ Timestamp Analysis: Extracts and converts FILETIME objects to readable dates
  • 📈 Focus Metrics: Analyzes application focus time and count data
  • 🔄 Multiple Export Formats: HTML, CSV, and JSON reports
  • 🎯 Anti-Forensics Detection: Identifies potential tampering with registry artifacts
  • 📱 Multi-Version Support: Works across Windows 7, 8, 10, and 11

➡️ Learn more about UserAssist Analysis ⬅️

📁 Prefetch Hunter Analysis

A sophisticated tool for analyzing Windows Prefetch files to reveal program execution history, identify potentially malicious binaries, and detect suspicious activity patterns. Essential for forensic investigators and threat hunters seeking to understand system usage.

Key Features:

  • 🔍 Execution Timeline: Track when and how often programs were executed
  • 🦠 LOLBAS Integration: Identify Living Off The Land binaries that attackers might abuse
  • Time Pattern Analysis: Detect unusual off-hours and weekend activity
  • 📊 Statistical Detection: Find execution frequency outliers and anomalies
  • 📈 Interactive Reports: Beautiful HTML reports with charts and visualizations
  • 🏷️ Smart Categorization: Classify findings by type (Security Tool, System Utility, etc.)
  • 🔄 Multiple Export Options: HTML, CSV, and JSON output formats

➡️ Learn more about Prefetch Hunter ⬅️

🗂️ ShellBag Hunter Analysis

A powerful forensic tool that extracts and analyzes Windows ShellBag data from the registry to reveal user browsing history and folder access patterns, even after deletion. Essential for digital forensics and investigations where user activity reconstruction is critical.

Key Features:

  • 🔎 Registry Extraction: Decodes complex binary ShellBag structures from multiple registry locations
  • 🗑️ Deleted Folder Detection: Identifies evidence of previously accessed but now-deleted directories
  • ⏱️ Timestamp Analysis: Reveals when folders were accessed and modified
  • 👥 Multi-User Analysis: Supports analysis across all user profiles on a system
  • 🔍 Path Hierarchy Reconstruction: Visualizes complete folder structure and navigation history
  • 📊 Flexible Filtering: Filter results by date range, specific paths, or recency
  • 📱 Windows 11 Support: Special handling for Windows 11's different artifact storage approach
  • 📈 Interactive Reports: Rich HTML reports with visualizations and organized findings

➡️ Learn more about ShellBag Hunter ⬅️

Project Vision

PowerShell-Hunter will continue to expand with new tools and capabilities focused on Windows-based threat hunting. Planned areas include:

  • 🔍 Further Windows Event Log Analysis
  • 🔧 Other random things

Getting Started

Each tool in the PowerShell-Hunter collection has its own documentation and usage instructions. See the respective README files in each directory for detailed information.

Prerequisites

  • PowerShell 5.1 or higher
  • Administrator access (for certain operations)
  • Windows environment
  • Tool-specific requirements detailed in individual READMEs

Contributing

We welcome contributions! Whether it's:

  • Adding new hunting tools
  • Improving existing detection patterns
  • Enhancing documentation
  • Reporting bugs
  • Suggesting features

Roadmap 🗺️

  • PowerShell 4104 Event Analysis
  • Active Directory Threat Hunting
  • Integration with SIEM systems
  • Machine Learning-based anomaly detection
  • Other random things, why not?

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

Acknowledgments

  • Inspired by the need for efficient Windows-based threat hunting
  • Built on the experience of security practitioners
  • Leverages community-contributed detection patterns
  • Pattern database

Made with ❤️ by defenders for defenders