Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Incident Response
  3. Hayabusa

Hayabusa

AGPL-3.0Rustv3.8.1

A Sigma-based threat hunting and fast forensics timeline generator for Windows event logs, written in Rust.

GitHubGitHub
3.1k stars263 forks0 contributors

What is Hayabusa?

Hayabusa is a Sigma-based threat hunting and fast forensics timeline generator for Windows event logs. It parses Windows event logs to detect malicious activity using Sigma rules and creates consolidated timelines for analysis, solving the problem of tedious and noisy log analysis in DFIR investigations.

Target Audience

Digital forensics and incident response (DFIR) analysts, threat hunters, and Windows system administrators who need to analyze Windows event logs for security investigations.

Value Proposition

Developers choose Hayabusa for its speed, comprehensive Sigma rule support, and ability to generate easy-to-analyze timelines. It is the only open-source tool with full Sigma v2 correlation rule support and integrates seamlessly with Velociraptor for enterprise-wide threat hunting.

Overview

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

Use Cases

Best For

  • Generating fast forensics timelines from Windows event logs
  • Threat hunting across enterprise endpoints using Sigma rules
  • Analyzing Windows event logs for incident response investigations
  • Integrating with Velociraptor for scalable DFIR workflows
  • Extracting and decoding Base64 strings from event log data
  • Creating pivot keyword lists to identify suspicious activity

Not Ideal For

  • Environments with exclusively Linux or macOS logs and no Windows event logs to analyze
  • Teams needing real-time, continuous SIEM alerting without retrospective analysis capabilities
  • Simple log review tasks where basic command-line tools like grep or built-in Windows Event Viewer suffice
  • Organizations requiring vendor-supported, certified tools for strict regulatory compliance audits

Pros & Cons

Pros

Extensive Sigma Rule Support

Hayabusa offers full Sigma specification support including v2 correlation rules, with over 4000 curated detection rules, providing broad coverage for Windows threat detection.

High Performance Cross-Platform

Written in memory-safe Rust with multi-threading, it delivers fast processing on Windows, Linux, and macOS, as evidenced by benchmarks showing up to 5x speed improvements.

Enterprise Threat Hunting Integration

Seamlessly integrates with Velociraptor via a dedicated artifact, enabling scalable DFIR across endpoints and effectively retrofitting SIEM capabilities in environments without one.

Comprehensive Analysis Features

Includes advanced commands like logon summaries, pivot keyword lists, and Base64 extraction, aiding in deep-dive investigations and data correlation from event logs.

Cons

Anti-Virus Interference

The README warns that anti-virus/EDR products often flag Hayabusa or its YAML rules due to keywords like 'mimikatz', requiring manual exclusions and potentially slowing first runs.

Windows-Event Log Centric

While it supports JSON input, its core functionality is optimized for Windows EVTX files, making it less suitable for heterogeneous environments with diverse log sources.

Complex Configuration Overhead

Managing thousands of YAML rules, config files, and tuning options (e.g., level-tuning, scan wizard) can be overwhelming, requiring significant expertise to avoid false positives.

Frequently Asked Questions

Quick Stats

Stars3,115
Forks263
Contributors0
Open Issues35
Last commit2 days ago
CreatedSince 2020

Tags

#digital-forensics#sigma-rules#hunting#logs#dfir#security-tool#attack#windows-event-logs#detection#incident-response#rust#windows#threat-hunting#event

Built With

R
Rust
D
Docker

Included in

Incident Response8.9k
Auto-fetched 1 day ago

Related Projects

SigmaSigma

Main Sigma Rule Repository

Stars10,351
Forks2,593
Last commit3 days ago
ChainsawChainsaw

Rapidly Search and Hunt through Windows Forensic Artefacts

Stars3,518
Forks296
Last commit23 days ago
LogonTracerLogonTracer

Investigate malicious Windows logon by visualizing and analyzing Windows event log

Stars3,162
Forks486
Last commit2 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub