{"payload":{"header_redesign_enabled":false,"results":[{"id":"296518768","archived":false,"color":"#dea584","followers":2061,"has_funding_file":false,"hl_name":"Yamato-Security/hayabusa","hl_trunc_description":"Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.","language":"Rust","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":296518768,"name":"hayabusa","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2024-06-29T08:56:24.299Z","has_issues":true}},"sponsorable":false,"topics":["windows","rust","security","attack","detection","incident-response","logs","event","threat","forensics","dfir","cybersecurity","response","threat-hunting","hunting","sigma","incident","security-automation","yamato","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"367190070","archived":false,"color":"#012456","followers":731,"has_funding_file":false,"hl_name":"Yamato-Security/WELA","hl_trunc_description":"WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)","language":"PowerShell","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":367190070,"name":"WELA","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2023-02-03T23:45:28.196Z","has_issues":true}},"sponsorable":false,"topics":["windows","log","analysis","timeline","logs","event","threat","forensics","dfir","response","hunting","sigma","incident"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"540142055","archived":false,"color":"#C1F12E","followers":504,"has_funding_file":false,"hl_name":"Yamato-Security/EnableWindowsLogSettings","hl_trunc_description":"Documentation and scripts to properly enable Windows event logs.","language":"Batchfile","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":540142055,"name":"EnableWindowsLogSettings","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2023-09-20T04:32:53.250Z","has_issues":true}},"sponsorable":false,"topics":["windows","security","auditing","monitoring","logs","event","forensics","dfir","sysmon","sigma","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"436824802","archived":false,"color":null,"followers":117,"has_funding_file":false,"hl_name":"Yamato-Security/hayabusa-rules","hl_trunc_description":"Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":436824802,"name":"hayabusa-rules","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2024-06-25T20:12:16.973Z","has_issues":true}},"sponsorable":false,"topics":["windows","attack","log","analysis","event","dfir","mitre","sigma","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"509099464","archived":false,"color":"#ffc200","followers":59,"has_funding_file":false,"hl_name":"Yamato-Security/takajo","hl_trunc_description":"Takajō (鷹匠) is a Hayabusa results analyzer.","language":"Nim","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":509099464,"name":"takajo","owner_id":72480401,"owner_login":"Yamato-Security","updated_at":"2024-06-29T03:48:06.851Z","has_issues":true}},"sponsorable":false,"topics":["windows","nim","log","analysis","event","nim-lang","hayabusa"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":113,"errors":[],"result_count":5,"facets":[{"kind":"FACET_KIND_LANGUAGE","entries":[{"name":"Batchfile","language_color":"#C1F12E","query":"language:Batchfile"},{"name":"Nim","language_color":"#ffc200","query":"language:Nim"},{"name":"PowerShell","language_color":"#012456","query":"language:PowerShell"},{"name":"Rust","language_color":"#dea584","query":"language:Rust"}]}],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dtopic%253Awindows%2Borg%253AYamato-Security%2Bfork%253Atrue%26type%3Drepositories","metadata":null,"csrf_tokens":{"/Yamato-Security/hayabusa/star":{"post":"joAj84c_B4j-0axt2JJQTflyUaO5LTEdEbjdV7gcD05UoYknayLJyIZUjfUNPZr3HoeoLnq6gex2Cp5ZSvG_Kw"},"/Yamato-Security/hayabusa/unstar":{"post":"OkE7XCVUkttct0zvzYUsZLgCmcVxly90MZsAqH7nvTK8GQkra4xIO1jTX3HYPcd7BTvIOHlN3Gq6SpeeJIoarw"},"/Yamato-Security/WELA/star":{"post":"3uoKNzp3bJqs38kf0EBBLLpljyo1UGFwff39L3GOmcIf40z5m8b97VNJtDsTVPbU5EEcDI2AwfA1NDy1HW4J4A"},"/Yamato-Security/WELA/unstar":{"post":"_BulvvGEh06pU9ZvRrUot_evaI7cbZUpiaRUfu6wHQi-a83BObIQc3TAVceRWxn97yF1qRxw06R4nsTdhqtVOA"},"/Yamato-Security/EnableWindowsLogSettings/star":{"post":"nFz8VcfBu1Kff52LVRmPqlllhc0i4D0X_aSAjWvTECDV7uhNNcP6QT9sR1lmD34ARMpMLwiE2vI0QjkOXZFfVQ"},"/Yamato-Security/EnableWindowsLogSettings/unstar":{"post":"hFNQGlPEx4VvY5ILBSXdlseX57_NywOsSSmMc99H5fDL-Rb5z92h6VSQo02xPZMcpycGB8V8iHcW1830a-2yug"},"/Yamato-Security/hayabusa-rules/star":{"post":"TiyYBupIr-_Ul7uud8njxBrtnhcg9d-tkXZejLEbBafmznomSHKERlHh5RVV0qCGO2mXe70Nhg0E4hSo5Omwsg"},"/Yamato-Security/hayabusa-rules/unstar":{"post":"towlwSgguOn-V7K9ih9Llgm88x5gxV0DLFrVOOcYIzd_p-ajgDlLv9z_1oMK0vlAogvvUlDyP_3ZanDnJ5r0qw"},"/Yamato-Security/takajo/star":{"post":"sfVRi_alaUs-MCAlIlxYIs-YtTbIbMjRPCEP1d4ibVf_AQU6_6YCGNV7OVULxnzs1aZK4JbqIA9uJep8fifQ3Q"},"/Yamato-Security/takajo/unstar":{"post":"M0ACzzCmpaXz6r4ZZWpEdIEn4I53IyLhGjmZ9k18hr8bKlz47E5Xj0_YtME9FaQyy1iZfGeQ6n1D6tOo5dk5uw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"LyJ6K2Hrt6cg5KqZD81cl2xh6ZYaDrLFyVcnQDftDQp-m1qnDMfhFJEFCTqvdjEh7KqqWcxqGERTt-CnLFhung"}}},"title":"Repository search results"}