Releases: Jayanth-4547/DFire
Releases · Jayanth-4547/DFire
DFire 1.0
🔥 Dfire 1.0 – System Information Collection Tool (Windows)
This release contains the standalone executable version of Dfire 1.0, a powerful system information collection tool designed for use in Windows environments. It is especially useful for:
- 🔍 Collecting detailed system, network, and hardware information
- 🛡️ Assisting in forensic investigations and cybersecurity assessments
- 📦 Running without requiring Python installation on the target machine (compiled with PyInstaller)
🧰 Features
- Retrieves detailed system specifications (CPU, RAM, OS, etc.)
- Collects network configuration and active connections
- Extracts Chrome browser artifacts (history, downloads, passwords)
- Gathers USB usage, startup items, event logs, and more
- AV/EDR friendly
- Lightweight and portable
.exeversion — no dependencies - Generates a clean and comprehensive PDF report
🚀 How to Use
- Download the latest release from the Releases section
- Run the
.exeas Administrator (recommended for full artifact access) - The tool auto-generates a detailed PDF report in the same directory
📦 What's Included in the Report
🖥️ System Information
- Hostname, OS version, boot time, system manufacturer
👤 User Info
- Current user
- All local user accounts and SIDs
- Environment variables
⚙️ Process & Service Monitoring
- Running processes with PIDs and usernames
- Installed services and their statuses
🌐 Network & Wi-Fi Data
- IP configuration, DNS, MAC, Gateway
- Active network connections
- Saved Wi-Fi profiles and security types
🚀 Startup Items
- Registry and folder-based startup programs
🌐 Chrome Artifacts
- Browsing history
- Download history
- Saved passwords (if accessible)
🧾 File and System Artifacts
- Recently accessed files
- USB connection history
- Recycle Bin contents
- Prefetch files
- Application jump lists
📝 Event & Task Logs
- System, security, and application logs
- Scheduled tasks and triggers
🧩 Installed Applications
- List of installed programs with version info
🛡️ Defender Status
- Protection state
- Scan history and recent threat logs
🗂️ Shadow Copies
- Volume shadow copy details
📁 Output
All data is compiled into a clean, professionally formatted PDF report, ideal for forensic documentation, internal audits, or post-incident analysis.
🖥️ Compatibility
- Windows 10 / 11 (64-bit)
- Admin privileges required
- May trigger antivirus alerts (false positive)
⚠️ Disclaimer
This tool is intended strictly for educational and authorized investigative use. Always ensure you have proper permissions before deploying it on any system.
🔐 SHA256 Checksum
📎 Filename: dfire-1.0.exe
📦 Size: 227 MB (238,811,298 bytes)
📌 SHA256: 8E36A18FB377A324334BCA8985A31E799024B2C2250A81CE7B8C79CF3218B8B0 – For verification