Skip to content
/ dfirt Public

Collect information of Windows PC when doing incident response.

Notifications You must be signed in to change notification settings

Abirett/dfirt

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

🔳 DFIRT (DFIR Tool)

Collect information of Windows PC when doing incident response.


ℹ️ DFIRT is a Powershell script. It collects information of-
  • recently used files,
  • suspicious Event ID,
  • Powershell history for all session,
  • files opened directly from Windows Explorer,
  • network related running services,
  • free space of disk,
  • Internet connectivity information,
  • safe DLL search mode,
  • last boot up time,
  • user accounts list from SID,
  • computer name, current build, ID,
  • current user language settings,
  • Windows Defender Status,
  • current Admin Approval Mode policy,
  • domain,
  • non default folders in Program File.

🔰 How to use:

1. Download the dfirt.ps1 script.
2. Start Windows Powershell.
3. Go to the DFIR folder.
4. Write .\dfirt.ps1 and press Enter.
5. Now, DFIRT will start collecting information and save those information in report.txt file.

⚠️ Remember

When you will run the script, result will be saved in report.txt file. But, if you again run the script and there is still previously saved report.txt file in the DFIRT folder then, the file will be overwritten with new report.

💬 A message to you:

I will try to continuously add new features to DFIRT. If you wish to add functionality, feel free to contribute here.

About

Collect information of Windows PC when doing incident response.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published