Process Visibility
See every running and recently executed process. Spot anomalous parent-child relationships and execution paths without digging through a dozen tools.
Windows Threat Hunting and Triage
An open-source tool that helps you quickly understand what is happening on a Windows endpoint. Surface persistence, dig into process activity, review event logs, and spot suspicious artifacts without chasing data across a dozen different places.
Three areas where WRAITH cuts time during a live investigation.
See every running and recently executed process. Spot anomalous parent-child relationships and execution paths without digging through a dozen tools.
Enumerate registry run keys, scheduled tasks, startup entries, and services to quickly find what is set to survive a reboot.
Parse and filter Windows event logs to surface logon anomalies, privilege escalation, and security-relevant system changes.
Launch the portable executable on any Windows 10/11 machine. No install required.
WRAITH enumerates processes, persistence, event logs, and browser artifacts in seconds.
Browse the structured output — flagged items are surfaced. Everything is in one view.
Use YARA hits, KEV matches, and process anomalies to decide where to dig next.
› wraith.exe
› collect
› review
› hunt
Processes. Persistence. Logs. Browser artifacts. In one place.
Each module targets a specific area of Windows host investigation so you can move through triage systematically.
Run YARA rules against host artifacts to detect known threat patterns and suspicious indicators during triage.
Enumerate and review common Windows persistence mechanisms including registry keys, scheduled tasks, and startup entries.
Examine running and historical process data to identify anomalous execution, suspicious parent-child relationships, and outliers.
Parse and filter Windows event logs to surface security-relevant events, logon anomalies, and system changes.
Collect and review browser history, downloads, and cached data across major browsers for investigation context.
Cross-reference discovered software and patch levels against the CISA Known Exploited Vulnerabilities catalog.
Generate structured triage reports summarizing findings, artifacts, and analyst observations for documentation and handoff.
Guided investigation workflows that help analysts systematically examine host data and surface what matters.
WRAITH started from a real frustration: doing Windows triage meant jumping between a dozen different tools, manually pulling registry keys, grepping through event logs, and hoping you caught everything that mattered. It takes too long, and it's easy to miss things when you are working fast under pressure.
This tool pulls the most important Windows artifacts together in one place. Running processes, persistence mechanisms, browser history, event log entries, YARA hits — it surfaces them all in a structured format so you can spend your time thinking about what the data means, not hunting for where the data lives.
WRAITH is not trying to replace your judgment as an analyst. It is trying to get you to useful information faster. The goal is simple: you open it, you see what is on the machine, and you decide where to dig next. No noise, no fluff.
It's built for the people who actually do this work, by people who have done this work. Open source, and focused on the job.
Areas we are actively working on and plan to ship in upcoming releases.
Additional forensic artifact parsers for WMI, services, prefetch, and network indicators.
Deeper YARA rule management, custom rule import, and match context enrichment.
Unified timeline view correlating event log entries, persistence changes, and process activity.
Secure remote data collection from Windows endpoints for centralized triage workflows.