9/12 free views
Tool
CLI
Incident Response & Management

chainsaw

by WithSecureLabs

3.4Kstars
295forks
56watchers
Updated 4 months ago
About

Chainsaw is a fast, Rust-based tool for rapidly searching and hunting through Windows forensic artefacts using Sigma and custom detection rules.

Rapidly Search and Hunt through Windows Forensic Artefacts

Primary Use Case

Chainsaw is designed for incident responders and threat hunters who need to quickly triage and analyze Windows forensic artefacts such as event logs, MFT, and registry hives, especially in environments lacking EDR telemetry. It enables rapid threat identification and forensic data extraction without the overhead of complex infrastructure like ELK or Splunk.

Key Features
  • Hunt for threats using Sigma detection rules and custom Chainsaw detection rules
  • Search and extract forensic artefacts by string matching and regex patterns
  • Create execution timelines by analyzing Shimcache artefacts enriched with Amcache data
  • Analyze the SRUM database and provide insights
  • Dump raw content of forensic artefacts including MFT, registry hives, and ESE databases
  • Lightning fast performance, written in Rust, leveraging the EVTX parser library
  • Clean, lightweight execution and output formats without unnecessary bloat
  • Document tagging via the TAU Engine library

Installation

  • Download the latest release binary from the GitHub repository
  • Alternatively, build from source using Rust toolchain (cargo build --release)
  • Install or build with Nix package manager if preferred
  • Run the executable directly on MacOS, Linux, or Windows

Usage

>_ chainsaw hunt --sigma <rule.yml> --evtx <eventlog.evtx>

Hunt for threats in Windows event logs using Sigma detection rules

>_ chainsaw search --string <keyword> --evtx <eventlog.evtx>

Search event logs for specific keywords or regex patterns

>_ chainsaw analyze shimcache --input <shimcache_file>

Create execution timelines by analyzing Shimcache artefacts

>_ chainsaw analyze srum --input <srum_database>

Analyze the SRUM database and extract usage insights

>_ chainsaw dump mft --input <mft_file>

Dump raw content from the Master File Table (MFT)

>_ chainsaw dump registry --input <registry_hive>

Dump raw content from Windows registry hives

>_ chainsaw --output json --evtx <eventlog.evtx>

Output results in JSON format for further processing

Security Frameworks
Discovery
Collection
Analysis
Detection
Response
Usage Insights
  • Integrate Chainsaw into automated incident response playbooks to accelerate triage of Windows forensic artefacts.
  • Use Chainsaw to supplement EDR telemetry gaps during purple team exercises to validate detection coverage.
  • Leverage Chainsaw’s Sigma rule support to rapidly prototype and test custom detection logic in hunting campaigns.
  • Deploy Chainsaw in environments without heavy SIEM infrastructure to enable lightweight forensic investigations.
  • Combine Chainsaw output with timeline analysis tools to enhance root cause analysis and attacker behavior reconstruction.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about chainsaw. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team40%
Blue Team90%
Purple Team75%
Details
LicenseGNU General Public License v3.0
LanguageRust
Open Issues115
Topics
attack
rust
security
threat-hunting
blueteam
chainsaw
detection
dfir
forensics
logs