:: Quickly and quietly run both scripts to gather and parse logs :: Download and run the scripts directly from GitHub :: Created by Alex Ivantsov @echo off :: Checking for Administrator elevation. openfiles>nul 2>&1 if %errorlevel% EQU 0 goto :Download echo. echo. echo. echo. echo. echo. You are not running as Administrator. echo. This script cannot do it's job without elevation. echo. echo. You need run this tool as Administrator. echo. exit :: Download Required Files from https://github.com/Exploitacious/WindowsEventsToCSVTimeline :Download PowerShell -Command "mkdir C:\Temp\GatherLogs -erroraction silentlycontinue" cd "C:\Temp\GatherLogs" PowerShell -executionpolicy bypass -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/Exploitacious/Windows_Toolz/refs/heads/main/Curl-able/Windows_Events_Audit/EventLogLauncher.ps1', 'EventLogLauncher.ps1')" PowerShell -executionpolicy bypass -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/Exploitacious/Windows_Toolz/refs/heads/main/Curl-able/Windows_Events_Audit/Gather-LogsToTimeLine.ps1', 'Gather-LogsToTimeLine.ps1')" PowerShell -executionpolicy bypass -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/Exploitacious/Windows_Toolz/refs/heads/main/Curl-able/Windows_Events_Audit/Parse-LogsToTimeLine.ps1', 'Parse-LogsToTimeLine.ps1')" PowerShell -executionpolicy bypass -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/Exploitacious/Windows_Toolz/refs/heads/main/Curl-able/Windows_Events_Audit/BaselineSettings.ps1', 'BaselineSettings.ps1')" PowerShell -executionpolicy bypass -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/Exploitacious/Windows_Toolz/refs/heads/main/Curl-able/Windows_Events_Audit/ClearWindowsEventLog.ps1', 'ClearWindowsEventLog.ps1')" PowerShell -executionpolicy bypass -Command "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/Exploitacious/Windows_Toolz/refs/heads/main/Curl-able/Windows_Events_Audit/BSODREPORT.ps1', 'BSODREPORT.ps1')" :: Start Running the Gather Logs scripts :RunScript SET ScriptDirectory=C:\Temp\GatherLogs\ SET PowerShellScriptPath=%ScriptDirectory%EventLogLauncher.ps1 PowerShell -NoProfile -ExecutionPolicy Bypass -Command "%PowerShellScriptPath%";