Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/emrekybs/douglas-042
Powershell script to help Speed up Threat hunting incident response processes
https://github.com/emrekybs/douglas-042
forensic-analysis forensics hunting incident-response powershell threat-hunting threat-intelligence
Last synced: about 1 month ago
JSON representation
Powershell script to help Speed up Threat hunting incident response processes
- Host: GitHub
- URL: https://github.com/emrekybs/douglas-042
- Owner: emrekybs
- License: mit
- Created: 2023-08-24T09:13:13.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-02-03T22:07:19.000Z (11 months ago)
- Last Synced: 2024-02-04T22:50:04.526Z (11 months ago)
- Topics: forensic-analysis, forensics, hunting, incident-response, powershell, threat-hunting, threat-intelligence
- Language: PowerShell
- Homepage:
- Size: 8.24 MB
- Stars: 36
- Watchers: 3
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Douglas-042 - Threat Hunting
# Incident Response - PowerShell Hunting
[![EmreKybs](https://img.shields.io/badge/MadeBy-Emrekybs-blue)
DOUGLAS-042 stands as an ingenious embodiment of a PowerShell script meticulously designed to expedite the triage process and facilitate the meticulous collection of crucial evidence derived from both forensic artifacts and the ephemeral landscape of volatile data. Its fundamental mission revolves around providing indispensable aid in the arduous task of pinpointing potential security breaches within Windows ecosystems. With an overarching focus on expediency, DOUGLAS-042 orchestrates the efficient prioritization and methodical aggregation of data, ensuring that no vital piece of information eludes scrutiny when investigating a possible compromise. As a testament to its organized approach, the amalgamated data finds its sanctuary within the confines of a meticulously named text file, bearing the nomenclature of the host system's very own hostname. This practice of meticulous data archival emerges not just as a systematic convention, but as a cornerstone that paves the way for seamless transitions into subsequent stages of the Forensic journey.### Content Queries
* General information
* Accountand group information
* Network
* Process Information
* OS Build and HOTFIXE
* Persistence
* HARDWARE Information
* Encryption information
* FIREWALL INFORMATION
* Services
* History
* SMB Queries
* Remoting queries
* REGISTRY Analysis
* LOG queries
* Instllation of Software
* User activity
### Advanced Queries
* Prefetch file information
* DLL List
* WMI filters and consumers
* Named pipes# Usage
Using administrative privileges, just run the script from a PowerShell console, then the results will be saved in the directory as a txt file.$ PS >./douglas.ps1
# Advance usage
$ PS >./douglas.ps1 -a