# z9
**Repository Path**: desiderio/z9
## Basic Information
- **Project Name**: z9
- **Description**: https://github.com/Sh1n0g1/z9.git
一款功能强大的PowerShell恶意软件检测与分析工具
- **Primary Language**: Unknown
- **License**: MIT
- **Default Branch**: main
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2023-11-13
- **Last Updated**: 2023-11-13
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# z9 PowerShell Log Analyzer
[Japanese](./README-ja.md)

## Abstract
This tools detects the artifact of the PowerShell based malware from the eventlog of PowerShell logging.
[Online Demo](https://z9.shino.club/)
## Install
```
git clone https://github.com/Sh1n0g1/z9
cd z9
pip install -r requirements.txt
```
## How to use
```
usage: z9.py [-h] [--output OUTPUT] [-s] [--no-viewer] [--utf8] input
positional arguments:
input Input file path
options:
-h, --help show this help message and exit
--output OUTPUT, -o OUTPUT
Output file path
-s, --static Enable Static Analysis mode
--no-viewer Disable opening the JSON viewer in a web browser
--utf8 Read scriptfile in utf-8 (deprecated)
```
### Analyze Event Logs (Recommended)
```
python z9.py -o