Powershell Digital Forensics & Incident Response (DFIR) equips cybersecurity professionals with a suite of PowerShell scripts tailored for effective incident handling on Windows devices.
From collecting forensic artifacts to analyzing security events, these tools streamline the process of identifying, understanding, and mitigating cyber threats, ensuring a robust defense mechanism in the digital landscape.
This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices.
The following Incident Response scripts are included:
The DFIR script collects information from multiple sources and structures the output in the current directory in a folder named ‘DFIR-hostname-year-month-date’.
This folder is zipped at the end, so that folder can be remotely collected. This script can also be used within Defender For Endpoint in a Live Response session (see below).
The DFIR script collects the following information when running as normal user:
For the best experience run the script as admin, then the following items will also be collected:
The forensic artefacts are exported as CSV files, which allows responders to ingest them into their tooling.
Some example tools in which you can ingest the data are Sentinel, Splunk, Elastic or Azure Data Explorer.
This will allow you to perform filtering, aggregation and visualisation with your preferred query language.
The folder CSV Results (SIEM Import Data) includes all the CSV files containing the artefacts, the folder listing is shown below.
Name
----
ActiveUsers.csv
AutoRun.csv
ConnectedDevices.csv
DefenderExclusions.csv
DNSCache.csv
Drivers.csv
InstalledSoftware.csv
IPConfiguration.csv
LocalUsers.csv
NetworkShares.csv
OfficeConnections.csv
OpenTCPConnections.csv
PowerShellHistory.csv
Processes.csv
RDPSessions.csv
RemotelyOpenedFiles.csv
RunningServices.csv
ScheduledTasks.csv
ScheduledTasksRunInfo.csv
SecurityEvents.csv
ShadowCopy.csv
SMBShares.csv
The DFIR Commands page contains invidividual powershell commands that can be used during your incident response process. The follwing catagories are defined:
The script can be excuted by running the following command.
.\DFIR-Script.ps1
The script is unsigned, that could result in having to use the -ExecutionPolicy Bypass to run the script.
Powershell.exe -ExecutionPolicy Bypass .\DFIR-Script.ps1
It is possible to use the DFIR Script in combination with the Defender For Endpoint Live Repsonse.
Make sure that Live Response is setup (See DOCS). Since my script is usigned a setting change must be made to able to run the script.
There is a blog article available that explains more about how to leverage Custom Script in Live Response: Incident Response Part 3: Leveraging Live Response
To run unsigned scripts live Response:
Execute script:
run DFIR-script.ps1
to start the script.getfile DFIR-DeviceName-yyyy-mm-dd
to download the retrieved artifacts to your local machine for analysis.SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…