Skip to content

syscall80h/Flowrensics

Repository files navigation

Flowrensics: Automate Windows Forensics Artifacts

License Python Platform Status

Flowrensics automates the collection and analysis of key Windows forensic artifacts.
It orchestrates Eric Zimmerman’s EZ Tools, Hayabusa, and Volatility 3.


Table of Contents

  1. Features
  2. Prerequisites
  3. Quick Start
  4. Usage
  5. Results
  6. Roadmap
  7. License

Features

  • One-click triage of Windows artifacts via EZ Tools (MFT, Prefetch, Registry hives, Event Logs, etc.).
  • Memory analysis pipeline powered by Volatility 3.
  • Fast threat-hunting timeline generation with Hayabusa (Sigma-rule-aware).
  • Auto-download & update: Hayabusa and Volatility binaries are fetched on first use.
  • Parallel execution with live progress and colorised logs.
  • Self-contained: all scripts run inside a Python virtual environment; no system-wide installs required.
  • Results folder structured for quick ingestion in Splunk, Timesketch, or Excel.
  • Tested on Windows 10 & 11.

Prerequies

Important

Requirements to run Flowrensics: OS: Windows 10 or Windows 11 Analysis Tools: Eric Zimmerman’s EZ Tools with the .NET 6 or .NET 9 desktop runtime installed Python: 3.10 or newer (64-bit)

Note

Hayabusa and Volatility are downloaded automatically the first time each module is invoked.

Warning

Volatility and Hayabusa can be resource- and time-intensive—plan accordingly.


Quick Start

# Clone and enter the repo
> git clone https://github.com/syscall80h/Flowrensics.git
> cd Flowrensics

# Set up an isolated environment (PowerShell)
> py -m venv venv
> .\venv\Scripts\Activate.ps1

# Install Python dependencies
(venv) > pip install -r requirements.txt

# Launch the GUI
(venv) > py main.py

Usage

image

  1. EZ Tools directory – browse to the net sub-folder containing the command-line EXEs. image

  2. Triage directory – select the root of the collection (e.g. the drive-letter folder). image

Important

Selecting the triage directory enables the Run Selected Tools button.

Sections

  • Windows Artifacts – choose individual EZ modules or run the full sweep.
  • Memory Analysis – point to a raw memory dump and pick Volatility plugins.

Results

All output is written to the Output directory, organised per module:

Output\
 ├─ EZ output     # CSV from EZ Tools
 ├─ Hayabusa\     # EVTX timeline & Sigma hits
 └─ Volatility\   # Plugin outputs

Roadmap

  • Add YARA scan support for memory dumps
  • Export consolidated timeline to Timesketch directly
  • Run Volatility for a specific PID
  • PDF rapport generated

License

Flowrensics is released under the MIT License – see the LICENSE file for details.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages