A Sigma-based threat hunting and fast forensics timeline generator for Windows event logs, written in Rust.
Hayabusa is a Sigma-based threat hunting and fast forensics timeline generator for Windows event logs. It parses Windows event logs to detect malicious activity using Sigma rules and creates consolidated timelines for analysis, solving the problem of tedious and noisy log analysis in DFIR investigations.
Digital forensics and incident response (DFIR) analysts, threat hunters, and Windows system administrators who need to analyze Windows event logs for security investigations.
Developers choose Hayabusa for its speed, comprehensive Sigma rule support, and ability to generate easy-to-analyze timelines. It is the only open-source tool with full Sigma v2 correlation rule support and integrates seamlessly with Velociraptor for enterprise-wide threat hunting.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Hayabusa offers full Sigma specification support including v2 correlation rules, with over 4000 curated detection rules, providing broad coverage for Windows threat detection.
Written in memory-safe Rust with multi-threading, it delivers fast processing on Windows, Linux, and macOS, as evidenced by benchmarks showing up to 5x speed improvements.
Seamlessly integrates with Velociraptor via a dedicated artifact, enabling scalable DFIR across endpoints and effectively retrofitting SIEM capabilities in environments without one.
Includes advanced commands like logon summaries, pivot keyword lists, and Base64 extraction, aiding in deep-dive investigations and data correlation from event logs.
The README warns that anti-virus/EDR products often flag Hayabusa or its YAML rules due to keywords like 'mimikatz', requiring manual exclusions and potentially slowing first runs.
While it supports JSON input, its core functionality is optimized for Windows EVTX files, making it less suitable for heterogeneous environments with diverse log sources.
Managing thousands of YAML rules, config files, and tuning options (e.g., level-tuning, scan wizard) can be overwhelming, requiring significant expertise to avoid false positives.
Main Sigma Rule Repository
Rapidly Search and Hunt through Windows Forensic Artefacts
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.