A PowerShell module for threat hunting and detecting malicious activity via Windows Event Logs.
DeepBlueCLI is a PowerShell module for threat hunting and security analysis using Windows Event Logs. It processes logs from multiple sources like Security, System, PowerShell, and Sysmon to detect malicious activities such as password attacks, suspicious command execution, and service manipulation. It helps security teams identify compromise indicators and attack patterns in Windows environments.
Security analysts, incident responders, and blue team members who need to hunt for threats in Windows environments using event logs. It's also useful for forensic investigators analyzing EVTX files from compromised systems.
Developers choose DeepBlueCLI because it provides a comprehensive, scriptable detection engine for Windows-specific attack techniques, with built-in decoding of obfuscated commands and flexible output formats. It leverages existing Windows logging without requiring additional agents, making it lightweight and practical for real-world hunting scenarios.
DeepBlueCLI is a PowerShell module designed for security professionals to perform threat hunting and forensic analysis using Windows Event Logs. It processes logs from Security, System, Application, PowerShell, and Sysmon sources to detect a wide range of suspicious activities and attack patterns.
lsadump::sam commands and EMET/AppLocker blocks.DeepBlueCLI prioritizes practical, actionable detection of real-world attack techniques, leveraging built-in Windows logging capabilities to provide defenders with a powerful, scriptable hunting tool.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Identifies over 20 specific malicious activities, including password spraying, Mimikatz lsadump::sam commands, and obfuscated PowerShell, as detailed in the 'Detected events' list from the README.
Exports results in JSON, CSV, HTML, XML, and PowerShell objects via standard cmdlets like ConvertTo-Json, enabling easy integration with SIEMs or other tools, as shown in the 'Output' section.
Decodes compressed and Base64-encoded commands automatically during analysis, saving time in forensic investigations, as mentioned in the 'Command line/Sysmon/PowerShell auditing' features.
Leverages existing Windows logging without additional agents and uses PowerShell objects for automation, making it a lightweight, actionable tool for defenders, per the 'Philosophy' and usage examples.
Requires manual configuration of Windows Event Logs (e.g., enabling event 4688), PowerShell auditing, and Sysmon installation, which is time-consuming and error-prone, as admitted in the 'Logging setup' section.
Exclusively processes Windows Event Logs from Security, System, Application, PowerShell, and Sysmon, making it ineffective for mixed or non-Windows environments.
Sample EVTX files in the package may trigger false positives from antivirus software, requiring whitelisting and causing operational delays, as warned in the README note.
Designed for batch analysis of logs or EVTX files, lacking features for continuous, real-time alerting or live stream processing, which limits proactive threat detection.