Chainsaw
Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.

Chainsaw
Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.
Go Beyond the Directory. Track the Entire Market.
Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.
Chainsaw Description
Chainsaw provides a powerful 'first-response' capability to quickly identify threats within Windows forensic artefacts such as Event Logs and the MFT file. It offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in support for Sigma detection rules, and via custom Chainsaw detection rules. Features include hunting for threats using Sigma detection rules and custom Chainsaw detection rules, searching and extracting forensic artefacts by string matching and regex patterns, creating execution timelines by analyzing Shimcache artefacts and enriching them with Amcache data, analyzing the SRUM database, dumping the raw content of forensic artefacts (MFT, registry hives, ESE databases), lightning-fast performance, clean and lightweight execution and output formats, document tagging provided by the TAU Engine Library, and outputting results in various formats like ASCII table, CSV, and JSON. It can be run on MacOS and Linux.
Chainsaw FAQ
Common questions about Chainsaw including features, pricing, alternatives, and user reviews.
Chainsaw is Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.. It is a Security Operations solution designed to help security teams with Digital Forensics, Event Log.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox