Skip to content

A cross-platform toolkit for IT troubleshooting and system diagnostics across Windows, Linux, and network environments. Includes automation scripts, auditing tools, maintenance utilities, and documentation for helpdesk staff, system administrators, and IT support engineers.

License

Notifications You must be signed in to change notification settings

NoLabelSecurity/TechSup-Toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

63 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Banner

A cross-platform toolkit for IT troubleshooting and system diagnostics across Windows, Linux, and network environments. Includes automation scripts, auditing tools, maintenance utilities, and documentation for helpdesk staff, system administrators, and IT support engineers.


🧭 Table of Contents


πŸ”Ž Overview

TechSup-Toolkit provides a unified toolbox for support engineers, blue-team analysts, and escalation teams.
Each tier contains tooling designed for different operational levels:

  • 🩺 Tier 1 β€” Core diagnostics & day-to-day troubleshooting
  • πŸ” Tier 2 β€” Security auditing & forensic artifact collection
  • πŸ›  Tier 3 β€” System engineering tools & deeper technical analysis
  • πŸ”¬ Tier 4 β€” Deep-dive subsystem inspection, kernel-level data, and performance forensics
  • πŸ§ͺ Tier 5 β€” High-fidelity system reporting & remote-support readiness analysis

The toolkit emphasizes:

  • Safe, non-destructive data collection
  • Unified TXT + JSON output
  • Consistent structure across all tiers
  • Production-safe diagnostic design
  • Enterprise-ready workflows and escalation paths

πŸ—οΈ Repository Structure



🟦 Tier Model



🧰 Tool Index

🩺 Tier 1 β€” Core Diagnostic Tools

This tier contains foundational system-health, troubleshooting, and baseline diagnostic tools. Each tool includes a structured β€œWhat This Script Provides” section summarizing capabilities, insights, and output formats.


πŸ“Œ Scripts Overview


πŸ’» system_info.ps1

⭐ What This Script Provides

🧰 Comprehensive System Profile

  • OS version & build
  • BIOS / UEFI details
  • CPU, RAM, motherboard
  • Disk layout + free space
  • Logged-on users

🌐 Network Context

  • Adapter summary
  • IP configuration
  • Routing table

⏱️ System State

  • Uptime
  • Installed updates
  • System identity & environment data

πŸ“ Output

  • system_info.txt
  • system_info.json
  • Timestamped output directory

🌐 network_info.ps1

⭐ What This Script Provides

πŸ” Full Network Diagnostics

  • Adapter operational state
  • IP + DNS configuration
  • Routing table
  • ARP table
  • Active TCP connections

πŸ“Š Health Indicators

  • Per-adapter network statistics
  • Firewall profile state
  • Connectivity insights

πŸ“ Output

  • network_info.txt
  • network_info.json
  • Timestamped output directory

πŸ“‘ eventlog_collect.ps1

⭐ What This Script Provides

πŸ“ Core Windows Logs

  • System
  • Application
  • Security
  • Setup

πŸ’₯ Crash & Reliability Data

  • WER crash logs
  • Critical + error event summaries

πŸ—ƒοΈ Raw Log Exporting

  • EVTX exports for escalation
  • Recent-event summaries

πŸ“ Output

  • eventlog_collect.txt
  • eventlog_collect.json
  • EVTX log bundle
  • Timestamped output directory

πŸ“¦ installed_programs.ps1

⭐ What This Script Provides

πŸ“‹ Full Software Inventory

  • 32-bit & 64-bit Registry-installed software
  • Per-user installed applications
  • MSI products
  • Winget packages

πŸ” Package Ecosystem Context

  • PowerShell package providers
  • Version + publisher metadata

πŸ“ Output

  • installed_programs.txt
  • installed_programs.json
  • Timestamped output directory

πŸ§ͺ process_audit.ps1

⭐ What This Script Provides

πŸ” Process-Level Visibility

  • CPU & RAM usage
  • Process executable paths
  • File description & company name

πŸ›‘οΈ Integrity & Risk Checks

  • SHA256 hashes
  • Unsigned or suspicious process indicators
  • Network-connected processes

πŸ“Š Process Summary

  • Total running processes
  • Total network-active processes

πŸ“ Output

  • process_audit.txt
  • process_audit.json
  • Timestamped output directory

βš™οΈ service_status.ps1

⭐ What This Script Provides

🧩 Service State Visibility

  • Running / stopped / disabled
  • Services failing to start
  • Service accounts & startup types

πŸ”’ Integrity Indicators

  • Unsigned services
  • Services running from temp locations

πŸ“Š Health Overview

  • Total services by state
  • Flagged or abnormal services

πŸ“ Output

  • service_status.txt
  • service_status.json
  • Timestamped output directory

πŸš€ startup_programs.ps1

⭐ What This Script Provides

🧰 Startup Mechanism Coverage

  • Registry Run / RunOnce (HKLM & HKCU)
  • Startup folders
  • WMI startup commands
  • Logon-triggered scheduled tasks

🚨 Suspicious Indicators

  • Missing executable paths
  • Unsigned startup programs
  • Items launching from temp directories

πŸ“ Output

  • startup_programs.txt
  • startup_programs.json
  • Timestamped output directory

🧹 disk_cleanup.ps1

⭐ What This Script Provides

πŸ—‘οΈ Safe Cleanup Actions

  • User + system temp folders
  • Recycle Bin cleanup
  • Windows Update cache cleanup
  • Delivery Optimization cleanup

🌐 Browser Cleanup

  • Chrome
  • Edge
  • Firefox

πŸ“Š Cleanup Metrics

  • Total freed bytes
  • Per-section cleanup summary

πŸ“ Output

  • disk_cleanup.txt
  • disk_cleanup.json
  • Timestamped output directory

πŸ” Tier 2 – Security & Forensics Tools

This tier contains advanced auditing, threat-hunting, and forensic artifact collection tools.
Each tool includes a structured β€œWhat This Script Provides” section summarizing capabilities, insights, and output formats.


πŸ“Œ Scripts Included


🌐 network_connection_audit.ps1

⭐ What This Script Provides

πŸ” Full Visibility Into Network Activity

  • All TCP sessions
  • UDP endpoints
  • Listening ports
  • Process β†’ connection mapping
  • External IP analysis

🚨 Suspicious Indicators

  • Unexpected public IP connections
  • High-risk remote ports
  • Processes making unusual outbound connections

🌐 DNS Context

  • Reverse lookups for remote IPs
  • Identification of suspicious hosts
  • Failed/unresolved hosts flagged

πŸ“Š Summary Metrics

  • Total unique external IPs
  • Count of suspicious connections
  • Total active connections

πŸ“ Output

  • network_connection_audit.txt
  • network_connection_audit.json
  • Timestamped output directory

πŸ–₯ rdp_audit.ps1

⭐ What This Script Provides

🟩 Configuration Checks

  • RDP enabled/disabled
  • NLA requirement
  • Custom RDP ports
  • Shadowing configuration
  • Remote Assistance policy

πŸ”₯ Exposure Checks

  • Firewall rules allowing RDP
  • Listening processes on port 3389
  • Open/insecure profiles
  • Non-standard port detection

πŸ‘€ Access Control Checks

  • RDP Users group membership
  • Local administrators
  • Unexpected RDP-enabled accounts

🚨 Threat Indicators

  • Failed RDP logons
  • Password-spray activity
  • Unauthorized connection attempts

πŸ“ Output Files

  • rdp_audit.txt
  • rdp_audit.json
  • Timestamped output directory

πŸ“… scheduled_task_audit.ps1

⭐ What This Script Provides

πŸ”₯ Persistence Hunting

  • Hidden scheduled tasks
  • Tasks with Temp/AppData executables
  • Missing or unsigned binaries
  • Recently created tasks

πŸš€ Startup Behavior

  • Logon-triggered tasks
  • Boot/startup tasks
  • Tasks impersonating system processes

πŸ•΅οΈ Suspicious Indicators

  • Nonexistent file paths
  • Untrusted/unsigned executables
  • Unexpected task actions
  • Disabled tasks used for staging

πŸ“ Generated Files

  • scheduled_task_audit.txt
  • scheduled_task_audit.json
  • Timestamped output folder

πŸ‘₯ user_group_audit.ps1

⭐ What This Script Provides

πŸ” User Account Security

  • Enabled/disabled accounts
  • Locked-out accounts
  • Dormant or inactive accounts
  • Accounts without passwords
  • Password-never-expires risks

🧩 Group Security

  • Full membership mapping
  • Administrators group audit
  • Orphaned/unknown SIDs
  • Privilege escalation detection

πŸ›‘ Risk Indicators

  • Excessive privileged users
  • Unexpected group changes
  • Ghost SIDs
  • Insecure account settings

πŸ“ Output Files

  • user_group_audit.txt
  • user_group_audit.json
  • Timestamped output directory

πŸ”Œ usb_history.ps1

⭐ What This Script Provides

🧩 USB Device History

  • All USB drives ever connected
  • Serial number, vendor ID, product ID
  • Last connected/disconnected timestamps
  • Mounted volume info

πŸ” Forensic Metadata

  • Registry artifacts
  • MountedDevices mapping
  • Friendly names & manufacturer info

πŸ’Ύ Live USB Information

  • Volume names
  • Drive letters
  • Storage size + free space

πŸ“ Output Files

  • usb_history.txt
  • usb_history.json
  • Timestamped directory

🌐 browser_history_collect.ps1

⭐ What This Script Provides

🧭 Multi-Browser Forensics

  • Chrome, Edge, Firefox, Brave, Opera support
  • URL, visit count, timestamp, page title extraction
  • Resilient SQLite copying (forensic-safe)

πŸ•΅οΈ Investigation Insights

  • Phishing indicators
  • Data exfiltration patterns
  • Suspicious browsing behavior
  • User activity timeline reconstruction

πŸ“ Output Files

  • browser_history.txt
  • browser_history.json
  • Timestamped directory

🧩 dns_cache_dump.ps1

⭐ What This Script Provides

🧩 DNS Forensics

  • Full DNS cache
  • Negative cache (failed lookups)
  • Active DNS client statistics
  • Resolver configuration
  • DNS servers per adapter

πŸ›‘ Security Insights

  • Recently resolved suspicious domains
  • NXDOMAIN failures
  • Evidence of tampered hosts file

πŸ“ Output Files

  • dns_cache_dump.txt
  • dns_cache_dump.json
  • Timestamped directory

πŸ”Ž suspicious_activity_scan.ps1

⭐ What This Script Provides

πŸ•΅οΈ Behavioral Threat Indicators

  • Suspicious processes
  • Hidden/unsigned executables
  • Abnormal parent–child process chains
  • LOLBin misuse (cmd.exe, powershell.exe, mshta.exe, wscript.exe)

🧩 File System Indicators

  • Malware staging directories
  • Recently dropped executables
  • Temp/AppData activity

🚨 Persistence Indicators

  • New Run/RunOnce entries
  • New scheduled tasks
  • Unexpected services

πŸ“ Output Files

  • suspicious_activity_scan.txt
  • suspicious_activity_scan.json
  • Timestamped directory

🚫 failed_login_report.ps1

⭐ What This Script Provides

πŸ” Authentication Monitoring

  • Event ID 4625 parsing
  • Username, IP, workstation, time
  • Password-spray detection
  • Excessive failure correlation

🧩 Account Abuse Indicators

  • Disabled account login attempts
  • Nonexistent user attempts
  • Repeated IP-based failures

πŸ“ Output Files

  • failed_login_report.txt
  • failed_login_report.json
  • Timestamped directory

πŸ›‘ permission_audit.ps1

⭐ What This Script Provides

πŸ” ACL Inspection

  • Directory/file permissions
  • Explicit vs inherited ACL breakdown
  • Audit of dangerous permissions

🚨 Privilege Escalation Indicators

  • β€œEveryone” or β€œAuthenticated Users” permissions
  • Write access to system folders
  • Executable locations with weak ACLs

πŸ“ Output Files

  • permission_audit.txt
  • permission_audit.json
  • Timestamped directory

πŸ—‚ sys_integrity_check.ps1

⭐ What This Script Provides

πŸ” File Integrity Analysis

  • Hashing critical system binaries
  • Detecting tampering or modification
  • Driver signature integrity checks

πŸ›‘ Security Component Validation

  • Defender status
  • Security service health
  • Protection feature validation

πŸ“ Output Files

  • sys_integrity_check.txt
  • sys_integrity_check.json
  • Timestamped directory

πŸ”₯ firewall_audit.ps1

⭐ What This Script Provides

🚧 Firewall Rule Visibility

  • Inbound/outbound rule listing
  • Active vs inactive rules
  • Allowed applications and services

🚨 Risk Indicators

  • Anyβ†’Any rules
  • Wide-open inbound ports
  • Exposed services
  • Disabled firewall profiles

πŸ“ Output Files

  • firewall_audit.txt
  • firewall_audit.json
  • Timestamped directory

πŸ§ͺ powershell_log_audit.ps1

⭐ What This Script Provides

πŸ•΅οΈ PowerShell Event Log Analysis

  • Scriptblock logging (4104)
  • Module logs (4103)
  • Engine lifecycle logs
  • Process creation correlations

🚨 Suspicious Indicators

  • Encoded commands
  • Obfuscated PowerShell
  • Untrusted script sources

πŸ“ Output Files

  • powershell_log_audit.txt
  • powershell_log_audit.json
  • Timestamped directory

πŸ›‘ malware_hunt.ps1

⭐ What This Script Provides

🦠 Host-Based Threat Hunting

  • Unsigned or suspicious processes
  • Abnormal parent/child process chains
  • LOLBin exploitation
  • Known malware behavior patterns

πŸ“‚ Filesystem Indicators

  • Suspicious EXEs in AppData/Temp
  • Recent executable creations
  • Staging directories

πŸ“ Output Files

  • malware_hunt.txt
  • malware_hunt.json
  • Timestamped directory

🌐 network_threat_hunt.ps1

⭐ What This Script Provides

🌍 Network IOC Detection

  • Repeated outbound beaconing
  • Long-lived suspicious sessions
  • C2-like timing patterns
  • Odd port/protocol usage

🧩 Network β†’ Process Mapping

  • Unsigned processes making connections
  • Hidden parent processes
  • Suspicious binaries contacting remote hosts

πŸ“ Output Files

  • network_threat_hunt.txt
  • network_threat_hunt.json
  • Timestamped directory

🧷 wmi_audit.ps1

⭐ What This Script Provides

πŸ“‘ WMI Forensics

  • WMI event filters
  • Command-line consumers
  • Permanent subscriptions
  • Rogue namespaces

🚨 Persistence Indicators

  • Fileless malware
  • Stealthy long-term implants

πŸ“ Output Files

  • wmi_audit.txt
  • wmi_audit.json
  • Timestamped directory

πŸͺ autoruns_full_audit.ps1

⭐ What This Script Provides

πŸ” Persistence Enumeration

  • Run / RunOnce keys
  • Startup folders
  • Services & drivers
  • Scheduled tasks
  • WMI autostarts

🚨 Suspicious Indicators

  • AppData/Temp startup executables
  • Missing or unsigned binaries
  • Encoded commands

πŸ“ Output Files

  • autoruns_full_audit.txt
  • autoruns_full_audit.json
  • Timestamped directory

πŸ› οΈ Tier 3 β€” Engineering Tools This tier contains system maintenance, configuration auditing, scheduled task analysis, backup inspection, storage diagnostics, and health-review tools. Each tool includes a structured **β€œWhat This Script Provides”** section summarizing capabilities, insights, and output formats.

πŸ“Œ Scripts Included


πŸ“… scheduled_tasks_maintenance.ps1

⭐ What This Script Provides

πŸ”§ Scheduled Task Visibility

  • Full task inventory
  • Last/next run timestamps
  • Exit codes and run history
  • Disabled task detection

🚨 Failure Indicators

  • Non-zero task results
  • Tasks missing run-as credentials
  • Tasks failing repeatedly

πŸ“ˆ Scheduling Insights

  • Chronological next-run overview
  • Startup/logon task breakdown

πŸ“ Output Files

  • scheduled_tasks_maintenance.txt
  • scheduled_tasks_maintenance.json
  • Timestamped output directory

🧩 driver_report.ps1

⭐ What This Script Provides

πŸ” Driver Inventory

  • Version
  • Provider
  • Driver date
  • INF source

πŸ” Security & Integrity

  • Signed vs unsigned status
  • Outdated driver identification
  • Potentially unsafe or orphaned drivers

βš™οΈ Service-Level Insights

  • Driver service state
  • Load type & configuration

πŸ“ Output Files

  • driver_report.txt
  • driver_report.json
  • Timestamped output directory

πŸ“‚ directory_size_report.ps1

⭐ What This Script Provides

πŸ“¦ Storage Usage Breakdown

  • Total directory size
  • File count & average size
  • Recursive folder traversal

🚨 Space Consumption Indicators

  • Largest files (Top-N)
  • Largest directories
  • Overgrown cache/log folders

πŸ“Š Optimization Insights

  • Cleanup candidates
  • Size-based impact analysis

πŸ“ Output Files

  • directory_size_report.txt
  • directory_size_report.json
  • Timestamped output directory

πŸ” permission_audit.ps1

⭐ What This Script Provides

πŸ” ACL Visibility

  • File/folder permission mapping
  • Explicit vs inherited breakdown
  • Identity β†’ Rights mapping

🚨 Risk Indicators

  • Weak ACLs
  • Insecure inheritance
  • Access-denied objects

🧩 Troubleshooting Insights

  • Missing or broken ACL entries
  • Failing paths recorded separately

πŸ“ Output Files

  • permission_audit.txt
  • permission_audit.json
  • Timestamped output directory

🧹 storage_files_cleanup.ps1

⭐ What This Script Provides

πŸ•’ Age-Based Cleanup

  • Old files older than X days
  • Abandoned logs/caches

πŸ“¦ Size-Based Cleanup

  • Large files exceeding size threshold
  • Oversized media/log objects

🧩 Temp & Cache Identification

  • .tmp, .bak, .old, .log, .cache

🧨 Optional Deletion Mode

  • Safe structured cleanup
  • Full action-by-action status

πŸ“ Output Files

  • storage_files_cleanup.txt
  • storage_files_cleanup.json
  • Timestamped output directory

♻️ backup_config.ps1

⭐ What This Script Provides

πŸ’Ύ Backup Visibility

  • Windows Backup (wbadmin) status
  • File History configuration

🧩 Restore Infrastructure Review

  • Restore point storage
  • Shadow storage allocation

πŸ“ System Readiness Insights

  • Backup health
  • Missing configuration detection

πŸ“ Output Files

  • backup_config.txt
  • backup_config.json
  • Timestamped output directory

πŸͺ„ restore_point_manager.ps1

⭐ What This Script Provides

πŸ“… Restore Point Management

  • List restore points
  • Create new restore points

🧹 Cleanup Automation

  • Delete older restore points
  • Keep newest N

πŸ“Š VSS Insights

  • Shadow storage allocation
  • Usage vs maximum size

πŸ“ Output Files

  • restore_point_manager.txt
  • restore_point_manager.json
  • Timestamped output directory

πŸ—„ registry_backup.ps1

⭐ What This Script Provides

πŸ’Ύ Full Registry Hive Backup

  • SYSTEM
  • SOFTWARE
  • SAM
  • SECURITY
  • HKCU

🧩 Backup Integrity

  • Timestamped archive names
  • Per-hive status reporting

πŸ”§ Automation Support

  • Export directory auto-creation
  • Clean error-handling

πŸ“ Output Files

  • registry_backup.txt
  • registry_backup.json
  • Timestamped backup directory

πŸ—ƒ system_log_archive.ps1

⭐ What This Script Provides

πŸ“₯ Event Log Collection

  • Application
  • System
  • Setup
  • Security (optional)

πŸ“„ System Log Archiving

  • CBS.log
  • DISM.log
  • WindowsUpdate.log

πŸ•’ Timestamped Archive Folders

  • Prevents overwrite
  • Supports case documentation

πŸ“ Output Files

  • system_log_archive.txt
  • system_log_archive.json
  • Timestamped output directory

πŸ›  patch_status.ps1

⭐ What This Script Provides

πŸ“… Patch Visibility

  • Installed KB list
  • Pending updates
  • Update release metadata

🧩 Update History

  • Success/failure tracking
  • Install timestamps

πŸ›‘ Servicing Health

  • DISM servicing status
  • Component-store corruption checks

πŸ“ Output Files

  • patch_status.txt
  • patch_status.json
  • Timestamped output directory

πŸ”¬ Tier 4 β€” Deep Dive

This tier contains deep-level diagnostic utilities designed for advanced troubleshooting, crash analysis, forensic reconstruction, and rootkit detection.
Each tool includes a structured β€œWhat This Script Provides” section summarizing its capabilities, insights, and output formats.


πŸ“Œ Scripts Included


πŸ’₯ app_crash_report.ps1

⭐ What This Script Provides

πŸ” Application Crash Analysis

  • Application Error events (Event ID 1000)
  • Windows Error Reporting failure events (Event ID 1001)
  • Faulting module, path, and exception code
  • Crash bucket and WER metadata

🧠 WER (Windows Error Reporting) Collection

  • Local crash archive scanning
  • Crash directory metadata
  • Historical crash patterns

πŸ“‰ Reliability Monitor Integration

  • Application reliability events
  • System-wide crash trends
  • Chronological failure events

πŸ“ Output Files

  • app_crash_report.txt
  • app_crash_report.json
  • Timestamped output directory

🧨 bsod_report.ps1

⭐ What This Script Provides

πŸ’₯ BSOD Crash Event Analysis

  • Kernel-Power (Event ID 41)
  • BugCheck (Event ID 1001)
  • Crash dump association
  • Blue screen frequency analysis

🧩 Minidump Insights

  • Minidump file listing
  • Dump timestamps and sizes
  • File system crash artifacts

🚨 Root Cause Indicators

  • BugCheck stop codes
  • Faulting driver patterns
  • Power failures and hardware symptoms

πŸ“ Output Files

  • bsod_report.txt
  • bsod_report.json
  • Timestamped output directory

πŸ•΅οΈ rootkit_scan.ps1

⭐ What This Script Provides

πŸ” Kernel-Level Threat Detection

  • Unsigned kernel drivers
  • Drivers loaded from suspicious paths
  • Running drivers bypassing system32

🧩 Hidden Process Identification

  • Session 0 user-mode processes
  • Parentless processes
  • Phantom background tasks

πŸ§ͺ Persistence Abuse Indicators

  • Autoruns from Temp/AppData
  • Unexpected Run/RunOnce entries
  • Stealthy startup mechanisms

πŸ“ Output Files

  • rootkit_scan.txt
  • rootkit_scan.json
  • Timestamped output directory

πŸ—‚οΈ mft_timeline_collect.ps1

⭐ What This Script Provides

πŸ•’ Filesystem Timeline Reconstruction

  • File creation timestamps
  • Modification timestamps
  • MFT timestamp events
  • NTFS metadata collection

πŸ“š Forensic USN Journal Parsing

  • Create, delete, rename events
  • Rapid file changes
  • Suspicious activity bursts

πŸ›‘ Compromise Investigation Indicators

  • Malware drop detection
  • Persistence file changes
  • Evidence of tampering or wipe activity

πŸ“ Output Files

  • mft_timeline_collect.txt
  • mft_timeline_collect.json
  • Timestamped output directory

πŸ§ͺ Tier 5 β€” Expert Tools This tier contains advanced enterprise-grade diagnostic and data-collection utilities designed for senior technicians and escalation engineers. Each tool includes a structured **β€œWhat This Script Provides”** section summarizing capabilities, insights, and output formats.

πŸ“Œ Scripts Included


πŸ›°οΈ remote_support_tool.ps1

⭐ What This Script Provides

πŸ“‘ Remote Support System Snapshot

  • Core OS and build information
  • System architecture and configuration
  • Hardware + platform metadata

🌐 Network Context

  • Adapter configuration
  • IP, DNS, gateway details
  • Interface operational status

🧡 Process Activity Overview

  • Active processes
  • CPU + memory insights
  • Vendor/signed process metadata

πŸ“¦ Installed Software Inventory

  • Full application list
  • Display name, version, publisher
  • Useful for compatibility review

🚨 Recent Critical Events

  • System-level errors
  • Hardware and kernel warnings
  • Failure correlation clues

πŸ“ Output Files

  • remote_support_tool.txt
  • remote_support_tool.json
  • Timestamped output directory

🧬 comprehensive_system_report.ps1

⭐ What This Script Provides

πŸ–₯ Advanced System Diagnostics

  • OS version + build
  • Computer information snapshot
  • Memory + architecture

🏷 Hardware Inventory

  • Manufacturer and model
  • Installed RAM
  • System identifiers

🌐 Network Diagnostics

  • NIC link speed
  • Adapter status
  • MAC address enumeration

πŸ’½ Storage & Disk Usage

  • Free/used disk capacity
  • Drive performance indicators

πŸ”§ Driver & Service Overview

  • Driver provider + version
  • Service start modes
  • Running/stopped states

πŸ›  Patch Status & Update History

  • Installed KBs
  • Update descriptions
  • Patch age indicators

🚨 Critical Event Log Summary

  • Kernel-level failures
  • Power events
  • Hardware error history

πŸ“ Output Files

  • comprehensive_system_report.txt
  • comprehensive_system_report.json
  • Timestamped output directory


πŸš€ Getting Started



πŸ“˜ Usage Examples



πŸ“‚ Supported Operating Systems



🀝 Contributing



πŸ“œ License



About

A cross-platform toolkit for IT troubleshooting and system diagnostics across Windows, Linux, and network environments. Includes automation scripts, auditing tools, maintenance utilities, and documentation for helpdesk staff, system administrators, and IT support engineers.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published