A modular PowerShell framework for enterprise incident response and breach hunting using remote data collection.
Kansa is a modular incident response framework built in PowerShell that automates forensic data collection across enterprise Windows systems. It uses PowerShell Remoting to execute security modules on remote hosts, helping teams investigate breaches, hunt for threats, or establish system baselines. The framework outputs structured data for analysis, streamlining the incident response process.
Security analysts, incident responders, and IT professionals managing Windows-based enterprise environments who need to collect and analyze forensic data during security incidents.
Kansa offers a scalable, modular approach to incident response with PowerShell-native integration, enabling rapid data collection across thousands of systems without relying on commercial tools. Its open-source nature and extensible module system provide flexibility for custom forensic workflows.
A Powershell incident response framework
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses PowerShell Remoting to run modules simultaneously across multiple hosts, enabling data collection from thousands of systems as highlighted in the README for enterprise-scale incident response.
Supports user-contributed scripts, allowing teams to customize and add forensic modules for specific needs, enhancing flexibility in breach hunts and baseline building.
Modules like Get-Netstat.ps1 can run independently, converting command-line output into structured formats like CSV or XML for easier analysis, as demonstrated with netstat data in the README.
Tested on PowerShell v2/.NET 2 and later, with recommendations for v3+, ensuring it works in diverse Windows environments, though performance is better with newer versions.
Requires unblocking PS1 files, adjusting execution policies, and enabling Windows Remote Management, which can be error-prone and time-consuming for new users, as noted in the setup steps.
Built entirely on PowerShell and Windows APIs, making it incompatible with Linux or macOS systems without significant workarounds, limiting its use in heterogeneous environments.
Relies on Windows API that adversaries might subvert, as mentioned in the caveats, though some modules like Get-RekallPslist.ps1 aim to bypass this, it remains a potential weakness.
Analysis scripts are optimized for data from many systems, reducing their utility for individual host investigations, as the README admits they may not make sense on single-host collections.