{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"hayabusa","owner":"Yamato-Security","isFork":false,"description":"Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.","allTopics":["windows","rust","attack","detection","logs","event","threat","forensics","dfir","response","hunting","sigma","incident","yamato","hayabusa","security","incident-response","cybersecurity","threat-hunting","security-automation"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":4,"issueCount":37,"starsCount":2061,"forksCount":181,"license":"GNU General Public License v3.0","participation":[45,42,50,20,38,15,14,12,29,35,12,19,0,2,11,37,13,19,14,13,17,14,2,8,33,0,0,15,6,8,13,41,22,15,29,33,15,9,3,5,0,10,5,28,11,7,8,9,18,5,14,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-29T08:56:24.299Z"}},{"type":"Public","name":"takajo","owner":"Yamato-Security","isFork":false,"description":"Takajō (鷹匠) is a Hayabusa results analyzer.","allTopics":["windows","nim","log","analysis","event","nim-lang","hayabusa"],"primaryLanguage":{"name":"Nim","color":"#ffc200"},"pullRequestCount":1,"issueCount":15,"starsCount":59,"forksCount":4,"license":"GNU General Public License v3.0","participation":[9,9,2,6,5,0,0,4,4,9,0,3,3,5,20,9,19,4,3,3,8,7,5,2,19,8,5,0,4,0,2,4,49,42,25,17,42,33,13,13,0,3,3,0,0,0,0,3,0,0,0,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-29T03:48:06.851Z"}},{"type":"Public","name":"hayabusa-encrypted-rules","owner":"Yamato-Security","isFork":false,"description":"Encrypted Hayabusa and Sigma rules to avoid anti-virus false positives","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":1,"starsCount":2,"forksCount":0,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,34],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-28T20:33:30.255Z"}},{"type":"Public","name":"hayabusa-rules","owner":"Yamato-Security","isFork":false,"description":"Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.","allTopics":["windows","attack","log","analysis","event","dfir","mitre","sigma","hayabusa"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":3,"starsCount":117,"forksCount":20,"license":"Other","participation":[30,2,7,2,3,4,3,3,4,4,5,2,2,2,3,5,2,5,8,6,3,4,5,4,25,1,2,3,20,23,5,11,3,2,5,1,4,11,21,4,7,3,8,5,3,2,3,4,10,0,1,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-25T20:12:16.973Z"}},{"type":"Public","name":"sigma-to-hayabusa-converter","owner":"Yamato-Security","isFork":false,"description":"Tool to convert Windows event log based Sigma rules to Hayabusa compatible rules. ","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":5,"starsCount":2,"forksCount":1,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,8,0,0,8],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-25T08:22:14.936Z"}},{"type":"Public","name":"Presentations","owner":"Yamato-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-11T10:59:36.899Z"}},{"type":"Public","name":"hayabusa-evtx","owner":"Yamato-Security","isFork":false,"description":"A fork of the evtx Rust crate for Hayabusa","allTopics":[],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":5,"starsCount":7,"forksCount":2,"license":"Apache License 2.0","participation":[0,0,0,1,3,4,0,0,4,1,0,9,0,0,0,0,0,2,1,1,0,2,0,0,2,0,0,0,3,0,0,1,4,1,0,0,0,0,3,0,0,2,2,0,0,0,0,0,0,2,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-09T00:53:27.669Z"}},{"type":"Public","name":"suzaku-rules","owner":"Yamato-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,3,0,8,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-30T23:59:05.590Z"}},{"type":"Public","name":"EnableWindowsLogSettings","owner":"Yamato-Security","isFork":false,"description":"Documentation and scripts to properly enable Windows event logs.","allTopics":["windows","auditing","monitoring","logs","event","forensics","dfir","sysmon","sigma","hayabusa","security"],"primaryLanguage":{"name":"Batchfile","color":"#C1F12E"},"pullRequestCount":0,"issueCount":1,"starsCount":504,"forksCount":50,"license":"GNU General Public License v3.0","participation":[0,0,0,1,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-20T04:32:53.250Z"}},{"type":"Public","name":".github","owner":"Yamato-Security","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":[0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-01T01:20:37.898Z"}},{"type":"Public","name":"hayabusa-sample-evtx","owner":"Yamato-Security","isFork":false,"description":"Sample evtx files to use for testing hayabusa detection rules","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":36,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-17T17:36:11.783Z"}},{"type":"Public","name":"WELA","owner":"Yamato-Security","isFork":false,"description":"WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)","allTopics":["windows","log","analysis","timeline","logs","event","threat","forensics","dfir","response","hunting","sigma","incident"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":9,"starsCount":731,"forksCount":77,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-03T23:45:28.196Z"}},{"type":"Public","name":"RustyBlue","owner":"Yamato-Security","isFork":false,"description":"RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.","allTopics":[],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":66,"forksCount":6,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-13T02:35:16.676Z"}}],"repositoryCount":13,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}