From asi
Parses Windows PowerShell Script Block Logs (Event ID 4104) from EVTX files using python-evtx to reconstruct scripts and detect obfuscated commands, Base64 payloads, download cradles, Invoke-Expression abuse, and AMSI bypasses for threat hunting.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
- When investigating security incidents that require analyzing powershell script block logging
Parses PowerShell Script Block Logs from EVTX files to detect obfuscated commands, encoded payloads, download cradles, and AMSI bypasses using python-evtx and entropy analysis.
Parses PowerShell script block logs (Event ID 4104) from EVTX files to detect obfuscated commands, Base64 payloads, download cradles, AMSI bypasses via python-evtx, entropy analysis, and pattern matching.
Parses Windows EVTX files for malicious PowerShell via Event 4104/4103 logs, detecting AMSI bypasses, obfuscated commands, encoded payloads, credential dumping, and download cradles. For threat hunting and incident analysis.
Share bugs, ideas, or general feedback.
pip install python-evtx lxmlMicrosoft-Windows-PowerShell%4Operational.evtx-EncodedCommand, FromBase64String)DownloadString, DownloadFile, Invoke-WebRequest, Net.WebClient)AmsiUtils, amsiInitFailed)python scripts/agent.py --evtx-file /path/to/PowerShell-Operational.evtx --output ps_analysis.json
import base64
if "-encodedcommand" in script_text.lower():
encoded = script_text.split()[-1]
decoded = base64.b64decode(encoded).decode("utf-16-le")
Scripts split across multiple 4104 events share a ScriptBlockId. Concatenate blocks ordered by MessageNumber to recover the full script.