Skip to content

Advanced PowerShell DFIR module for forensic analysis, threat hunting, and cmdline investigation in Windows.

Notifications You must be signed in to change notification settings

blwhit/ThreatHunter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

124 Commits
 
 
 
 
 
 

Repository files navigation

threathunter

Overview

ThreatHunter is a comprehensive PowerShell toolkit designed for threat hunting, digital forensics, and incident response (DFIR).

It provides a suite of hunt functions to detect persistence mechanisms, analyze system artifacts, search event logs, and generate detailed forensic reports - all through PowerShell on the command line.

Read the Wiki


🎯 Core Capabilities

Function Purpose
Hunt-ForensicDump Forensic collection with interactive HTML reporting
Hunt-Persistence Detect 60+ persistence techniques (registry, services, WMI, tasks)
Hunt-Logs Event log analysis with caching and IOC detection
Hunt-Browser Browser history/extension analysis with tool integration
Hunt-Files File hunting by time, content, hashes, and ADS
Hunt-Registry Registry search, autoruns, and Run MRU (ClickFix detection)
Hunt-Services Service enumeration with svchost DLL resolution
Hunt-Tasks Scheduled task analysis with privilege detection
Hunt-VirusTotal VirusTotal API integration with auto-upload

🔧 Installation

Option 1: Install the Module from PS Gallery

Install-Module ThreatHunter -Force -AllowClobber

Import-Module ThreatHunter

Install Module for Temporary Usage

Install-Module ThreatHunter -Scope CurrentUser

Import-Module ThreatHunter

# When Done
Uninstall-Module ThreatHunter

Option 2: Install from Git

git clone https://github.com/blwhit/ThreatHunter.git

cd .\ThreatHunter\

Import-Module .\ThreatHunter.psd1

Option 3: Install from Web Request

Invoke-WebRequest -Uri "https://raw.githubusercontent.com/blwhit/ThreatHunter/refs/heads/main/ThreatHunter.psm1" -OutFile "ThreatHunter.psm1"

Import-Module ".\ThreatHunter.psm1"

Troubleshooting Errors:

[Problem] Execution Policy is Blocking Module

Import-Module : File 'ThreatHunter.psm1' cannot be loaded because running scripts is disabled on this system.

[Fix] Temporarily set execution policy for the current PowerShell session.

Set-ExecutionPolicy Unrestricted -Scope Process

🚀 Quick Examples

# Quick forensic dump and Export EVTZ to ZIP
Hunt-ForensicDump -StartDate "3D" -LoadBrowserTool -SkipConfirmation -ExportLogs

# Hunt for persistence
Hunt-Persistence -Aggressive

# Search all event logs for IOCs
Hunt-Logs -StartDate "7D" -Search "mimikatz"

# Pull all browser history
Hunt-Browser -LoadTool -SkipConfirmation

📋 Requirements

  • PowerShell 5.0+
  • Windows 7/Server 2008 R2 or later
  • Administrator privileges (recommended)

⚡ Key Features

  • Pure PowerShell - No compiled binaries or external dependencies
  • Interactive HTML Reports - Single-file forensic reports with dark/light themes
  • Smart Caching - Browser and log caching for fast repeated searches
  • Multiple Outputs - Console, CSV, PowerShell objects
  • Date Filtering - Flexible relative and absolute date formats
  • MITRE ATT&CK - Persistence techniques mapped to framework
  • ClickFix Detection - Analyze Win+R commands for social engineering attacks
  • Offline Analysis - Process exported EVTX logs and CSV files

📚 Documentation


🛡️ Use Cases

  • Incident Response - Quick triage and comprehensive data collection
  • Threat Hunting - Proactive search for persistence and IOCs
  • Forensic Analysis - Detailed system artifact examination

🔗 Resources


Author: [Blake White]
Version: 1.0
Last Updated: Jan 2026

Releases

No releases published

Packages

No packages published