Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/emrekybs/douglas-042

Powershell script to help Speed ​​up Threat hunting incident response processes
https://github.com/emrekybs/douglas-042

forensic-analysis forensics hunting incident-response powershell threat-hunting threat-intelligence

Last synced: about 1 month ago
JSON representation

Powershell script to help Speed ​​up Threat hunting incident response processes

Awesome Lists containing this project

README

        

# Douglas-042 - Threat Hunting
# Incident Response - PowerShell Hunting
[![EmreKybs](https://img.shields.io/badge/MadeBy-Emrekybs-blue)


DOUGLAS-042 stands as an ingenious embodiment of a PowerShell script meticulously designed to expedite the triage process and facilitate the meticulous collection of crucial evidence derived from both forensic artifacts and the ephemeral landscape of volatile data. Its fundamental mission revolves around providing indispensable aid in the arduous task of pinpointing potential security breaches within Windows ecosystems. With an overarching focus on expediency, DOUGLAS-042 orchestrates the efficient prioritization and methodical aggregation of data, ensuring that no vital piece of information eludes scrutiny when investigating a possible compromise. As a testament to its organized approach, the amalgamated data finds its sanctuary within the confines of a meticulously named text file, bearing the nomenclature of the host system's very own hostname. This practice of meticulous data archival emerges not just as a systematic convention, but as a cornerstone that paves the way for seamless transitions into subsequent stages of the Forensic journey.

### Content Queries
* General information
* Accountand group information
* Network
* Process Information
* OS Build and HOTFIXE
* Persistence
* HARDWARE Information
* Encryption information
* FIREWALL INFORMATION
* Services
* History
* SMB Queries
* Remoting queries
* REGISTRY Analysis
* LOG queries
* Instllation of Software
* User activity
### Advanced Queries
* Prefetch file information
* DLL List
* WMI filters and consumers
* Named pipes

# Usage
Using administrative privileges, just run the script from a PowerShell console, then the results will be saved in the directory as a txt file.

$ PS >./douglas.ps1

# Advance usage
$ PS >./douglas.ps1 -a