Chainsaw Logo

Chainsaw

0
Free
Visit Website

Chainsaw provides a powerful 'first-response' capability to quickly identify threats within Windows forensic artefacts such as Event Logs and the MFT file. It offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in support for Sigma detection rules, and via custom Chainsaw detection rules. Features include hunting for threats using Sigma detection rules and custom Chainsaw detection rules, searching and extracting forensic artefacts by string matching and regex patterns, creating execution timelines by analyzing Shimcache artefacts and enriching them with Amcache data, analyzing the SRUM database, dumping the raw content of forensic artefacts (MFT, registry hives, ESE databases), lightning-fast performance, clean and lightweight execution and output formats, document tagging provided by the TAU Engine Library, and outputting results in various formats like ASCII table, CSV, and JSON. It can be run on MacOS and Linux.

FEATURES

ALTERNATIVES

Python forensic tool for extracting and analyzing information from Firefox, Iceweasel, and Seamonkey browsers.

Custom built application for asynchronous forensic data presentation on an Elasticsearch backend, with upcoming features like Docker-based installation and new UI rewrite in React.

Tool for live forensics acquisition on Windows systems, collecting artefacts for early compromise detection.

Developing APIs to access memory on industrial control system devices.

A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.

libevt is a library to access and parse Windows Event Log (EVT) files.

Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.