Hayabusa
AGPL-3.0🔬 Digital Forensics · Rust
Hayabusa is a forensic tool designed to generate timelines from Windows event logs and facilitate threat hunting. Written in Rust, it integrates Sigma rule support to automatically detect suspicious activities, making it a powerful utility for digital forensics and incident response (DFIR) operations. Its fast processing capability allows security professionals to efficiently analyze large volumes of log data for potential security threats.
Tags
Details
- Category
- 🔬 Digital Forensics
- Language
- Rust
- Repository
- Yamato-Security/hayabusa
- License
- AGPL-3.0
- Platforms
- 🐧linux🍎macos🪟windows
Links
More in Digital Forensics
Volatility 3
PythonAdvanced memory forensics framework. Extracts artifacts from RAM dumps — processes, network connections, registry.
Autopsy
JavaDigital forensics platform with GUI. Disk image analysis, timeline analysis, keyword search, hash filtering.
Ghidra
JavaNSA's reverse engineering framework. Disassembly, decompilation, graphing, and scripting for binary analysis.
Binwalk
PythonFirmware analysis tool. Searches binary images for embedded files, executables, and file systems.
YARA
CPattern matching swiss knife for malware researchers. Create rules to identify and classify malware samples.
Velociraptor
GoEndpoint visibility and collection tool. Hunt for artifacts across thousands of endpoints simultaneously.