Chainsaw Logo

Chainsaw

0
Free
Visit Website

Chainsaw provides a powerful 'first-response' capability to quickly identify threats within Windows forensic artefacts such as Event Logs and the MFT file. It offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in support for Sigma detection rules, and via custom Chainsaw detection rules. Features include hunting for threats using Sigma detection rules and custom Chainsaw detection rules, searching and extracting forensic artefacts by string matching and regex patterns, creating execution timelines by analyzing Shimcache artefacts and enriching them with Amcache data, analyzing the SRUM database, dumping the raw content of forensic artefacts (MFT, registry hives, ESE databases), lightning-fast performance, clean and lightweight execution and output formats, document tagging provided by the TAU Engine Library, and outputting results in various formats like ASCII table, CSV, and JSON. It can be run on MacOS and Linux.

FEATURES

ALTERNATIVES

A library to access and parse Windows Shortcut File (LNK) format.

Tool for analyzing Windows Recycle Bin INFO2 file

A tool for parsing and extracting information from the Master File Table of NTFS file systems.

Orochi is a collaborative forensic memory dump analysis framework.

A console program for file recovery through data carving.

A utility for recovering deleted files from ext3 or ext4 partitions.

Custom built application for asynchronous forensic data presentation on an Elasticsearch backend, with upcoming features like Docker-based installation and new UI rewrite in React.

A user-friendly and fast Forensic Analysis tool with features like tagging files and generating preview reports.