Dfire is a standalone Windows executable that collects and compiles a wide range of system information into a clean, professional PDF report — perfect for forensic analysis, audits, or post-incident reviews.
- 📊 System specs (CPU, RAM, OS, boot time)
- 🌐 Network configuration and active connections
- 🔍 Chrome browser artifacts (history, downloads, passwords)
- 🧾 Event logs, startup items, scheduled tasks
- 🧠 Running processes and installed services
- 🧩 Installed applications
- 🧰 USB usage, Recycle Bin, recent files, shadow copies
- 📄 All data compiled into a single PDF report
- 🛡️ AV/EDR friendly & portable
.exe— no dependencies needed
- Download the
.exefile from the Releases section - Right-click > Run as Administrator (recommended for full artifact access)
- Wait for data collection to complete — the PDF report will be generated in the same folder
- Hostname, boot time, OS details, system manufacturer
- Current and local user accounts, environment variables
- Running processes with PIDs/usernames
- Installed services and statuses
- IP, MAC, Gateway, DNS
- Active connections, saved Wi-Fi profiles
- Browsing and download history
- Saved credentials (if accessible)
- Startup items
- Recently accessed files
- USB history, Recycle Bin, Prefetch, Jump Lists
- System, security, and application event logs
- Scheduled tasks and triggers
- Installed programs with version info
- Defender status and threat logs
- Volume shadow copy details
- ✔️ Windows 10 / 11 (64-bit)
⚠️ Admin privileges recommended- 🚫 May trigger antivirus alerts (false positive)
Filename: dfire-1.0.exe
Size: 227 MB (238,811,298 bytes)
SHA256:
8E36A18FB377A324334BCA8985A31E799024B2C2250A81CE7B8C79CF3218B8B0
For verification
This tool is intended strictly for educational and authorized investigative use. Do not use it on any system without explicit permission.
- Sample report preview
- Documentation
Made with ❤️ by Jayanth Tatineni
Feel free to open issues or suggestions via GitHub Issues
Dfire – Light up your system insights 🔥

