All Projects → IllusiveNetworks-Labs → Historicprocesstree

IllusiveNetworks-Labs / Historicprocesstree

Licence: bsd-3-clause
An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree view.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Historicprocesstree

fastfinder
Incident Response - Fast suspicious file finder
Stars: ✭ 116 (+152.17%)
Mutual labels:  incident-response, dfir
Beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+2021.74%)
Mutual labels:  dfir, incident-response
rhq
Recon Hunt Queries
Stars: ✭ 66 (+43.48%)
Mutual labels:  incident-response, dfir
MemProcFS-Analyzer
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (+93.48%)
Mutual labels:  incident-response, dfir
Thehivedocs
Documentation of TheHive
Stars: ✭ 353 (+667.39%)
Mutual labels:  dfir, incident-response
catalyst
Catalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (+97.83%)
Mutual labels:  incident-response, dfir
My Arsenal Of Aws Security Tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Stars: ✭ 6,464 (+13952.17%)
Mutual labels:  dfir, incident-response
uac
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+465.22%)
Mutual labels:  incident-response, dfir
Cortex4py
Python API Client for Cortex
Stars: ✭ 22 (-52.17%)
Mutual labels:  dfir, incident-response
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+576.09%)
Mutual labels:  dfir, incident-response
Evilize
Parses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-47.83%)
Mutual labels:  incident-response, dfir
Cyberchef Recipes
A list of cyber-chef recipes and curated links
Stars: ✭ 619 (+1245.65%)
Mutual labels:  dfir, incident-response
PSTrace
Trace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-17.39%)
Mutual labels:  incident-response, dfir
ir scripts
incident response scripts
Stars: ✭ 17 (-63.04%)
Mutual labels:  incident-response, dfir
Docker-Templates
Docker configurations for TheHive, Cortex and 3rd party tools
Stars: ✭ 71 (+54.35%)
Mutual labels:  incident-response, dfir
Threatpinchlookup
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (+458.7%)
Mutual labels:  dfir, incident-response
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+386.96%)
Mutual labels:  incident-response, dfir
CDIR
CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (+165.22%)
Mutual labels:  incident-response, dfir
Kuiper
Digital Forensics Investigation Platform
Stars: ✭ 257 (+458.7%)
Mutual labels:  dfir, incident-response
Awesome Incident Response
A curated list of tools for incident response
Stars: ✭ 4,753 (+10232.61%)
Mutual labels:  dfir, incident-response

HistoricProcessTree

HistoricProcessTree receives a Security Event Log file (evtx) and visualizes historic process execution evidence (based on 4688 events) in a tree view.

Analyzing processes execution, their time and their ancestors, provides researchers an initial understanding of what happened on an investigated machine.

Additional reading material on the tool, can be found in our blog Visualising Historic Process Execution Events.

Requirements

pip install anytree jinja2

How to use

Usage: HistoricProcessTree.py [-h] [-s START_TIME] [-e END_TIME] [--hours NUM_OF_HOURS] input_file output_file

positional arguments:
  input_file            Path to evtx file
  output_file           Final name of the generated HTML

optional arguments:
  -h, --help               Show this help message and exit
  -s START_TIME 		   Start date filter- Format: "MM/DD/YYYY HH:MM:SS"
  -e END_TIME       	   End date filter- Format: "MM/DD/YYYY HH:MM:SS"
  --hours HOURS            Number of hours to go back since last event

Examples

HistoricProcessTree.py c:\work\Security.evtx -s “01/10/2018 15:45:00” -e “01/10/2017 16:00” output_file.html Note: Run this from the tool's working directory

will generate the following HTML page:

alt tag

Authors

License

This project is licensed under the BSD 3-clause license - see the LICENSE file for details

Contributors

  • Illusive Networks Research & Dev team members:
    • Tom Sela
    • Dolev Ben Shushan
    • Hadar Yudovich
    • Yair Fried
  • Jonathan Miles for JQuery Plugin bootstrap-treeview.js
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].