extracting-windows-event-logs-artifacts

Installation
SKILL.md

Extracting Windows Event Logs Artifacts

When to Use

  • When investigating security incidents on Windows systems through event log analysis
  • For detecting lateral movement, privilege escalation, and persistence mechanisms
  • When performing threat hunting across Windows event log data
  • During compliance audits requiring review of authentication and access events
  • When building forensic timelines from Windows system activity

Prerequisites

  • Windows Event Log files (EVTX format) from forensic image or live system
  • Chainsaw, Hayabusa, or EvtxECmd for parsing and detection
  • Sigma rules for automated threat detection
  • Understanding of critical Windows Event IDs
  • Python with python-evtx or evtx library for custom parsing
  • PowerShell for live system analysis (if applicable)

Workflow

Related skills
Installs
15
GitHub Stars
6.3K
First Seen
Mar 18, 2026