secops-gthub/Eventlog_Visualizer

GitHub: secops-gthub/Eventlog_Visualizer

一款将 Windows 事件日志重构为分层 EDR 进程树的高保真安全分析工具,解决多源日志关联与可视化难题。

Stars: 0 | Forks: 0

```markdown # 多源 EDR 可视化工具 (Sysmon、Defender 与安全日志) 一款高保真安全分析工具,可将 Windows 事件日志重构为分层式 EDR 风格进程树。本版本具备增强型通用解析引擎、专用 SHA256 提取功能,以及性能优化的 HTML 渲染引擎。 🚀 核心功能 ``` Universal Property Mapping: Uses advanced XML-based parsing to correctly extract "Named" properties (like TargetUserName, IpAddress, and CommandLine) from Security and Sysmon logs that typically appear blank in standard viewers. SHA256 Hash Visibility (New): Automatically isolates the SHA256 hash from Sysmon events. Long hashes are truncated in the view for cleanliness but are viewable via Tooltip hover. GUI Cell Copying (New): Select any cell (Hash, Timestamp, ID) and press Ctrl+C to copy the data directly to your clipboard for use in threat intelligence lookups. Performance-Optimized HTML Export: Utilizes StringBuilder logic and background UI management to generate massive investigation reports instantly without application hanging. Full Date Range Filtering: Dedicated DatePickers allow for filtering merged datasets—essential for investigations involving manual imports of older forensic .evtx files. Multi-Source Ingestion: Sysmon: Process behavior (ID 1), network telemetry (ID 3), and DNS queries (ID 22). Windows Defender: Malware detection and remediation history. Windows Security: Decoded Logons (4624), Process Auditing (4688), Group Enumeration (4798), and Credential Reads (5379). Cumulative Loading: Append multiple log files to a single session to track lateral movement across different machines and timeframes. Persistent Investigation: Filter logic is non-destructive. If a search yields no results, clearing the filters and clicking Apply restores your full original log set. ``` 📋 系统要求 ``` OS: Windows 10/11 or Windows Server 2016+. PowerShell: Version 7.x. Permissions: Administrator privileges are required to access live local log streams. ``` 🛠️ 工作原理 1. 源选择 启动后,您可以选择从本地机器拉取最近 24 小时的实时日志,或继续前往仪表板手动导入取证文件。 2. 仪表板 - 添加日志:将新的 .evtx 文件合并到当前时间线中。 - 清除日志:重置当前调查并清除会话内存。 - 通用筛选器:按用户、事件 ID、SHA256 哈希、日期范围或活动关键词进行过滤。 - 状态栏:提供日志数量与处理状态的实时反馈。 3. 报告 - 打开 HTML:生成临时 CSS 样式报告并在默认浏览器中打开。 - 保存 HTML:导出一个独立的便携式报告用于取证。引擎已优化,可防止在大型导出时界面冻结。 📥 安装指南 ``` Download Sysmon_Visualizer.ps1. Open PowerShell as Administrator. Run the script: .\Sysmon_Visualizer.ps1 ``` ```
标签:AI合规, EDR可视化, GUI数据复制, IPv6, Libemu, PowerShell, SEO: EDR工具, SEO: Windows事件日志分析, SEO: 多源日志可视化, SHA256哈希提取, Sysmon, Windows Defender, Windows Security, Windows安全分析, XML解析, 事件日志重构, 取证时间线, 多模态安全, 多源日志摄取, 大数据日志处理, 威胁情报查找, 性能优化HTML导出, 持久化调查, 数据可视化, 日志分析工具, 日志可视化, 日志文件解析, 日期范围过滤, 进程树可视化, 通用属性映射