evtxtools
This package aims to be a collection of tools for forensic analysis of evtx files
evtxscan
Finds time skews in an evtx file
Example
Usage
evtxscan 0.2.0
Find time skews in an evtx file
USAGE:
evtxscan [OPTIONS] <EVTX_FILE>
ARGS:
<EVTX_FILE> name of the evtx file to scan
OPTIONS:
-h, --help
Print help information
-N, --negative-tolerance <NEGATIVE_TOLERANCE>
negative tolerance limit (in seconds): time skews to the past below this limit will be
ignored [default: 5]
-S, --show-records
display also the contents of the records befor and after a time skew
-V, --version
Print version information
evtxcat
Displays one or more events from an evtx file.
Example
Usage
evtxcat 1.1.0
Display one or more events from an evtx file
USAGE:
evtxcat [OPTIONS] <EVTX_FILE>
ARGS:
<EVTX_FILE> Name of the evtx file to read from
OPTIONS:
-F, --format <FORMAT> [possible values: json, xml]
-h, --help Print help information
-i, --id <ID> show only the one event with this record identifier
--max <MAX> filter: maximal event record identifier
--min <MIN> filter: minimal event record identifier
-T, --hide-table don't display the records in a table format
-V, --version Print version information
evtxls
Display one or more events from an evtx file
Usage
Usage: evtxls [OPTIONS] [EVTX_FILE]...
Arguments:
[EVTX_FILE]... Name of the evtx file to read from
Options:
-d, --delimiter <DELIMITER> use this delimiter instead of generating fixed space columns
-b, --bodyfile produce bodyfile output (ignores the `delimiter` option)
-i, --event-id <FILTER_EVENT_IDS> List events with only the specified event ids
-c, --colors highlight interesting content using colors
-f, --from <NOT_BEFORE> hide events older than the specified date (hint: use RFC 3339 syntax)
-t, --to <NOT_AFTER> hide events newer than the specified date (hint: use RFC 3339 syntax)
-r, --regex <HIGHLIGHT> highlight event data based on this regular expression
-h, --help Print help information
-V, --version Print version information
processtree
Usage
reconstructs a process tree, based on Windows audit logs
Usage: processtree [OPTIONS] <EVTX_FILE>
Arguments:
<EVTX_FILE> Name of the evtx file to parse
Options:
-U, --username <USERNAME> display only processes of this user (case insensitive regex search)
-F, --format <FORMAT> [default: json] [possible values: json, markdown]
-v, --verbose... More output per occurrence
-q, --quiet... Less output per occurrence
-h, --help Print help information
-V, --version Print version information
Example (markdown Output)
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe(0x89d0, created2022-12-07T23:02:49)C:\Windows\System32\conhost.exe(0x78ec, created2022-12-07T23:02:49)C:\Windows\System32\net.exe(0x43c4, created2022-12-07T23:03:10)C:\Windows\System32\net1.exe(0x59fc, created2022-12-07T23:03:10)
C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe(0x952c, created2022-12-07T23:03:18)C:\Windows\System32\conhost.exe(0x4f3c, created2022-12-07T23:07:22)C:\Windows\System32\PING.EXE(0x85a8, created2022-12-07T23:07:22)C:\Windows\System32\PING.EXE(0x86fc, created2022-12-07T23:07:49)C:\Windows\System32\PING.EXE(0x7928, created2022-12-07T23:07:59)
C:\Windows\System32\net.exe(0x8774, created2022-12-07T23:05:31)C:\Windows\System32\net1.exe(0x7b5c, created2022-12-07T23:05:31)
C:\Windows\System32\net.exe(0x9b64, created2022-12-07T23:06:10)C:\Windows\System32\net1.exe(0x4fc4, created2022-12-07T23:06:10)
C:\Windows\System32\nltest.exe(0x5274, created2022-12-07T23:06:31)
C:\Windows\System32\mstsc.exe(0x6494, created2022-12-07T23:08:15)
Example (JSON output)
"2022-12-07T23:03:10.374631+00:00": ,