{"payload":{"header_redesign_enabled":false,"results":[{"id":"296518768","archived":false,"color":"#dea584","followers":2061,"has_funding_file":false,"hl_name":"Yamato-Security/hayabusa","hl_trunc_description":"Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.","language":"Rust","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":296518768,"name":"hayabusa","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2024-06-29T08:56:24.299Z","has_issues":true}},"sponsorable":false,"topics":["windows","rust","security","attack","detection","incident-response","logs","event","threat","forensics","dfir","cybersecurity","response","threat-hunting","hunting","sigma","incident","security-automation","yamato","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"367190070","archived":false,"color":"#012456","followers":731,"has_funding_file":false,"hl_name":"Yamato-Security/WELA","hl_trunc_description":"WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)","language":"PowerShell","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":367190070,"name":"WELA","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2023-02-03T23:45:28.196Z","has_issues":true}},"sponsorable":false,"topics":["windows","log","analysis","timeline","logs","event","threat","forensics","dfir","response","hunting","sigma","incident"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"540142055","archived":false,"color":"#C1F12E","followers":504,"has_funding_file":false,"hl_name":"Yamato-Security/EnableWindowsLogSettings","hl_trunc_description":"Documentation and scripts to properly enable Windows event logs.","language":"Batchfile","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":540142055,"name":"EnableWindowsLogSettings","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2023-09-20T04:32:53.250Z","has_issues":true}},"sponsorable":false,"topics":["windows","security","auditing","monitoring","logs","event","forensics","dfir","sysmon","sigma","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"436824802","archived":false,"color":null,"followers":117,"has_funding_file":false,"hl_name":"Yamato-Security/hayabusa-rules","hl_trunc_description":"Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":436824802,"name":"hayabusa-rules","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2024-06-25T20:12:16.973Z","has_issues":true}},"sponsorable":false,"topics":["windows","attack","log","analysis","event","dfir","mitre","sigma","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"509099464","archived":false,"color":"#ffc200","followers":59,"has_funding_file":false,"hl_name":"Yamato-Security/takajo","hl_trunc_description":"Takajō (鷹匠) is a Hayabusa results analyzer.","language":"Nim","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":509099464,"name":"takajo","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2024-06-29T03:48:06.851Z","has_issues":true}},"sponsorable":false,"topics":["windows","nim","log","analysis","event","nim-lang","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":125,"errors":[],"result_count":5,"facets":[{"kind":"FACET_KIND_LANGUAGE","entries":[{"name":"Batchfile","language_color":"#C1F12E","query":"language:Batchfile"},{"name":"Nim","language_color":"#ffc200","query":"language:Nim"},{"name":"PowerShell","language_color":"#012456","query":"language:PowerShell"},{"name":"Rust","language_color":"#dea584","query":"language:Rust"}]}],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dtopic%253Aevent%2Borg%253AYamato-Security%2Bfork%253Atrue%26type%3Drepositories","metadata":null,"csrf_tokens":{"/Yamato-Security/hayabusa/star":{"post":"qn2dLQdW26BxDsKCTP2P2JDGOJO3EziiiGp2uuCPzNWNjPxXKlmIab8taY3SOCrjmvFN40xYrTHSBg9UoKH_gQ"},"/Yamato-Security/hayabusa/unstar":{"post":"_zo-z1V7OOl_Mv9et7rgddtvicAoGKC5RfY_-_BTECEAytDuPdc7qJ3TrN2OL2r_E6LJbuZ9I26OV0pwjYLc9g"},"/Yamato-Security/WELA/star":{"post":"-_xOAsTomdWPJTIQH1AqHB3XnWm9QJjYTXiy0yYz-2N640XkoTR0q5Vl38C8SzqaKlxFg2qaVArFR7QZ4OW7mg"},"/Yamato-Security/WELA/unstar":{"post":"7ypr0WJgADFCDvtzj26VhaJv9sqr14qroWGwb0EbC-A7KdOlGu4IzuF_fhw8RHSnz1T4PtKgA8UntXqNaMwSyA"},"/Yamato-Security/EnableWindowsLogSettings/star":{"post":"QDO9o3QjHp-vPglTHg9ffzrVmgw52eOdToAR7oFml1U-PhMStDbll2xSPxVHXba3KhrX2k_F9ghErVHy_odtNg"},"/Yamato-Security/EnableWindowsLogSettings/unstar":{"post":"QOmuu4sjNpWNSe-RRgogSf_zfxIpl8ctX9aTiz2euQuANkshDEisse8nOqwCtEdNahqu-3Pdv4_cNJqmWmgAgA"},"/Yamato-Security/hayabusa-rules/star":{"post":"li06APZuwOf2xjZ2DoKVQYnHclTY5B7Oj-GEu6ICVhZ3KuxgexWrJmHye1iY4mGEntSAjcotHn3y3C8Es47KQQ"},"/Yamato-Security/hayabusa-rules/unstar":{"post":"YHVZTKKfrHRD-colfg-MLro7oxt7ulUXJPfaygKVZHFccXOrzfhg5aV9g8w4vA6G1cAGIwMb-GjikHqnmdgG6Q"},"/Yamato-Security/takajo/star":{"post":"6tePB7fgG3hyviDM1iYvSEeaY8JotAgwvMVvDcdarmC5Fqck1ho2n_I8Q01n9gaOeUFvV9a_2G3vLUFBK4dTKw"},"/Yamato-Security/takajo/unstar":{"post":"x8e_RmXZB_yvWLlKl8qohK057mpbJMqV2xtmlER9KU5X3gnHuPv0qw-gBqaWUd1dnx560JVG3aST6kRfs5eR0A"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"otgcpbwtA2EzkoB2F_nYDRGgPYQDqgGbO5AZyovQaB1A2z2YUp2v2X2VYxR_RVXJXOcf5HSzM1cZNyL44EdwRw"}}},"title":"Repository search results"}