Version: 1.2 (Includes HTML Report Support)
Author: DFIRVault
This Python script is a Windows-friendly wrapper for the Hayabusa event log timeline tool.
It provides a simple, menu-driven interface to scan folders or mounted forensic images containing .evtx files, then generates CSV timelines and HTML reports for digital forensic and incident response (DFIR) work.
- GUI Folder/File Selection
Uses a simple Tkinter interface to pick Hayabusa's executable, EVTX folders, and output locations. - CSV + HTML Output
Automatically generates both a machine-readable CSV timeline and a human-readable HTML report. - Case-Based Naming
Outputs files with the format:YYYYMMDD-FolderName-CaseName-results.csv YYYYMMDD-FolderName-CaseName-report.html YYYYMMDD-FolderName-CaseName-log.txt - Subfolder Search
Optionally scans subdirectories to find EVTX files if not in the main folder. - Forensic Image Support
Can scan mounted images or point directly to standard Windows log locations. - Portable
No installation needed — run directly from Python.
- Operating System: Windows 10/11
- Python: 3.7+
- Dependencies:
pip install pywin32
- Hayabusa: Download the latest release from
https://github.com/Yamato-Security/hayabusa/releases
-
Clone this repository:
git clone https://github.com/dfirvault/hayabusa-log-tool.git cd hayabusa-log-tool -
Install Python dependencies:
pip install pywin32
-
Download Hayabusa and place
hayabusa.exein:C:\Tools\Hayabusa\hayabusa.exe, or- The same directory as this script.
Run the script with Python:
python hayabusa_tool.py[1] Scan a folder or mounted image containing EVTX files
[0] Exit
- Start the script.
- Select the location of
hayabusa.exe(first run only). - Choose [1] to scan EVTX files.
- Select a folder containing
.evtxfiles (or let the tool search subfolders). - Choose an output location for reports.
- Enter a case name (e.g., MAL2024-001).
- Wait for Hayabusa to complete — results will open automatically in Windows Explorer.
CSV Timeline:
20240815-WorkstationLogs-MAL2024-001-results.csv
HTML Report:
20240815-WorkstationLogs-MAL2024-001-report.html
Log File:
20240815-WorkstationLogs-MAL2024-001-log.txt
- Run as Admin: Some log locations may require elevated privileges. Uncomment the
is_admin()section inmain()if you want automatic UAC prompts. - Forensic Image Support: Mount the image and point the tool to the mounted drive’s
Windows\System32\winevt\Logsfolder. - Performance: Hayabusa scan time depends on the number and size of EVTX files.
This script is released under the MIT License.
Hayabusa is maintained by Yamato Security and follows its own licensing terms.
