Skip to content

Latest commit

 

History

History
1329 lines (951 loc) · 27.5 KB

File metadata and controls

1329 lines (951 loc) · 27.5 KB

Banner

A cross-platform toolkit for IT troubleshooting and system diagnostics across Windows, Linux, and network environments. Includes automation scripts, auditing tools, maintenance utilities, and documentation for helpdesk staff, system administrators, and IT support engineers.


🧭 Table of Contents


🔎 Overview

TechSup-Toolkit provides a unified toolbox for support engineers, blue-team analysts, and escalation teams.
Each tier contains tooling designed for different operational levels:

  • 🩺 Tier 1 — Core diagnostics & day-to-day troubleshooting
  • 🔐 Tier 2 — Security auditing & forensic artifact collection
  • 🛠 Tier 3 — System engineering tools & deeper technical analysis
  • 🔬 Tier 4 — Deep-dive subsystem inspection, kernel-level data, and performance forensics
  • 🧪 Tier 5 — High-fidelity system reporting & remote-support readiness analysis

The toolkit emphasizes:

  • Safe, non-destructive data collection
  • Unified TXT + JSON output
  • Consistent structure across all tiers
  • Production-safe diagnostic design
  • Enterprise-ready workflows and escalation paths

🏗️ Repository Structure



🟦 Tier Model



🧰 Tool Index

🩺 Tier 1 — Core Diagnostic Tools

This tier contains foundational system-health, troubleshooting, and baseline diagnostic tools. Each tool includes a structured “What This Script Provides” section summarizing capabilities, insights, and output formats.


📌 Scripts Overview


💻 system_info.ps1

⭐ What This Script Provides

🧰 Comprehensive System Profile

  • OS version & build
  • BIOS / UEFI details
  • CPU, RAM, motherboard
  • Disk layout + free space
  • Logged-on users

🌐 Network Context

  • Adapter summary
  • IP configuration
  • Routing table

⏱️ System State

  • Uptime
  • Installed updates
  • System identity & environment data

📁 Output

  • system_info.txt
  • system_info.json
  • Timestamped output directory

🌐 network_info.ps1

⭐ What This Script Provides

🔍 Full Network Diagnostics

  • Adapter operational state
  • IP + DNS configuration
  • Routing table
  • ARP table
  • Active TCP connections

📊 Health Indicators

  • Per-adapter network statistics
  • Firewall profile state
  • Connectivity insights

📁 Output

  • network_info.txt
  • network_info.json
  • Timestamped output directory

📑 eventlog_collect.ps1

⭐ What This Script Provides

📝 Core Windows Logs

  • System
  • Application
  • Security
  • Setup

💥 Crash & Reliability Data

  • WER crash logs
  • Critical + error event summaries

🗃️ Raw Log Exporting

  • EVTX exports for escalation
  • Recent-event summaries

📁 Output

  • eventlog_collect.txt
  • eventlog_collect.json
  • EVTX log bundle
  • Timestamped output directory

📦 installed_programs.ps1

⭐ What This Script Provides

📋 Full Software Inventory

  • 32-bit & 64-bit Registry-installed software
  • Per-user installed applications
  • MSI products
  • Winget packages

🔍 Package Ecosystem Context

  • PowerShell package providers
  • Version + publisher metadata

📁 Output

  • installed_programs.txt
  • installed_programs.json
  • Timestamped output directory

🧪 process_audit.ps1

⭐ What This Script Provides

🔍 Process-Level Visibility

  • CPU & RAM usage
  • Process executable paths
  • File description & company name

🛡️ Integrity & Risk Checks

  • SHA256 hashes
  • Unsigned or suspicious process indicators
  • Network-connected processes

📊 Process Summary

  • Total running processes
  • Total network-active processes

📁 Output

  • process_audit.txt
  • process_audit.json
  • Timestamped output directory

⚙️ service_status.ps1

⭐ What This Script Provides

🧩 Service State Visibility

  • Running / stopped / disabled
  • Services failing to start
  • Service accounts & startup types

🔒 Integrity Indicators

  • Unsigned services
  • Services running from temp locations

📊 Health Overview

  • Total services by state
  • Flagged or abnormal services

📁 Output

  • service_status.txt
  • service_status.json
  • Timestamped output directory

🚀 startup_programs.ps1

⭐ What This Script Provides

🧰 Startup Mechanism Coverage

  • Registry Run / RunOnce (HKLM & HKCU)
  • Startup folders
  • WMI startup commands
  • Logon-triggered scheduled tasks

🚨 Suspicious Indicators

  • Missing executable paths
  • Unsigned startup programs
  • Items launching from temp directories

📁 Output

  • startup_programs.txt
  • startup_programs.json
  • Timestamped output directory

🧹 disk_cleanup.ps1

⭐ What This Script Provides

🗑️ Safe Cleanup Actions

  • User + system temp folders
  • Recycle Bin cleanup
  • Windows Update cache cleanup
  • Delivery Optimization cleanup

🌐 Browser Cleanup

  • Chrome
  • Edge
  • Firefox

📊 Cleanup Metrics

  • Total freed bytes
  • Per-section cleanup summary

📁 Output

  • disk_cleanup.txt
  • disk_cleanup.json
  • Timestamped output directory

🔐 Tier 2 – Security & Forensics Tools

This tier contains advanced auditing, threat-hunting, and forensic artifact collection tools.
Each tool includes a structured “What This Script Provides” section summarizing capabilities, insights, and output formats.


📌 Scripts Included


🌐 network_connection_audit.ps1

⭐ What This Script Provides

🔍 Full Visibility Into Network Activity

  • All TCP sessions
  • UDP endpoints
  • Listening ports
  • Process → connection mapping
  • External IP analysis

🚨 Suspicious Indicators

  • Unexpected public IP connections
  • High-risk remote ports
  • Processes making unusual outbound connections

🌐 DNS Context

  • Reverse lookups for remote IPs
  • Identification of suspicious hosts
  • Failed/unresolved hosts flagged

📊 Summary Metrics

  • Total unique external IPs
  • Count of suspicious connections
  • Total active connections

📁 Output

  • network_connection_audit.txt
  • network_connection_audit.json
  • Timestamped output directory

🖥 rdp_audit.ps1

⭐ What This Script Provides

🟩 Configuration Checks

  • RDP enabled/disabled
  • NLA requirement
  • Custom RDP ports
  • Shadowing configuration
  • Remote Assistance policy

🔥 Exposure Checks

  • Firewall rules allowing RDP
  • Listening processes on port 3389
  • Open/insecure profiles
  • Non-standard port detection

👤 Access Control Checks

  • RDP Users group membership
  • Local administrators
  • Unexpected RDP-enabled accounts

🚨 Threat Indicators

  • Failed RDP logons
  • Password-spray activity
  • Unauthorized connection attempts

📁 Output Files

  • rdp_audit.txt
  • rdp_audit.json
  • Timestamped output directory

📅 scheduled_task_audit.ps1

⭐ What This Script Provides

🔥 Persistence Hunting

  • Hidden scheduled tasks
  • Tasks with Temp/AppData executables
  • Missing or unsigned binaries
  • Recently created tasks

🚀 Startup Behavior

  • Logon-triggered tasks
  • Boot/startup tasks
  • Tasks impersonating system processes

🕵️ Suspicious Indicators

  • Nonexistent file paths
  • Untrusted/unsigned executables
  • Unexpected task actions
  • Disabled tasks used for staging

📁 Generated Files

  • scheduled_task_audit.txt
  • scheduled_task_audit.json
  • Timestamped output folder

👥 user_group_audit.ps1

⭐ What This Script Provides

🔐 User Account Security

  • Enabled/disabled accounts
  • Locked-out accounts
  • Dormant or inactive accounts
  • Accounts without passwords
  • Password-never-expires risks

🧩 Group Security

  • Full membership mapping
  • Administrators group audit
  • Orphaned/unknown SIDs
  • Privilege escalation detection

🛡 Risk Indicators

  • Excessive privileged users
  • Unexpected group changes
  • Ghost SIDs
  • Insecure account settings

📁 Output Files

  • user_group_audit.txt
  • user_group_audit.json
  • Timestamped output directory

🔌 usb_history.ps1

⭐ What This Script Provides

🧩 USB Device History

  • All USB drives ever connected
  • Serial number, vendor ID, product ID
  • Last connected/disconnected timestamps
  • Mounted volume info

🔍 Forensic Metadata

  • Registry artifacts
  • MountedDevices mapping
  • Friendly names & manufacturer info

💾 Live USB Information

  • Volume names
  • Drive letters
  • Storage size + free space

📁 Output Files

  • usb_history.txt
  • usb_history.json
  • Timestamped directory

🌐 browser_history_collect.ps1

⭐ What This Script Provides

🧭 Multi-Browser Forensics

  • Chrome, Edge, Firefox, Brave, Opera support
  • URL, visit count, timestamp, page title extraction
  • Resilient SQLite copying (forensic-safe)

🕵️ Investigation Insights

  • Phishing indicators
  • Data exfiltration patterns
  • Suspicious browsing behavior
  • User activity timeline reconstruction

📁 Output Files

  • browser_history.txt
  • browser_history.json
  • Timestamped directory

🧩 dns_cache_dump.ps1

⭐ What This Script Provides

🧩 DNS Forensics

  • Full DNS cache
  • Negative cache (failed lookups)
  • Active DNS client statistics
  • Resolver configuration
  • DNS servers per adapter

🛡 Security Insights

  • Recently resolved suspicious domains
  • NXDOMAIN failures
  • Evidence of tampered hosts file

📁 Output Files

  • dns_cache_dump.txt
  • dns_cache_dump.json
  • Timestamped directory

🔎 suspicious_activity_scan.ps1

⭐ What This Script Provides

🕵️ Behavioral Threat Indicators

  • Suspicious processes
  • Hidden/unsigned executables
  • Abnormal parent–child process chains
  • LOLBin misuse (cmd.exe, powershell.exe, mshta.exe, wscript.exe)

🧩 File System Indicators

  • Malware staging directories
  • Recently dropped executables
  • Temp/AppData activity

🚨 Persistence Indicators

  • New Run/RunOnce entries
  • New scheduled tasks
  • Unexpected services

📁 Output Files

  • suspicious_activity_scan.txt
  • suspicious_activity_scan.json
  • Timestamped directory

🚫 failed_login_report.ps1

⭐ What This Script Provides

🔐 Authentication Monitoring

  • Event ID 4625 parsing
  • Username, IP, workstation, time
  • Password-spray detection
  • Excessive failure correlation

🧩 Account Abuse Indicators

  • Disabled account login attempts
  • Nonexistent user attempts
  • Repeated IP-based failures

📁 Output Files

  • failed_login_report.txt
  • failed_login_report.json
  • Timestamped directory

🛑 permission_audit.ps1

⭐ What This Script Provides

🔍 ACL Inspection

  • Directory/file permissions
  • Explicit vs inherited ACL breakdown
  • Audit of dangerous permissions

🚨 Privilege Escalation Indicators

  • “Everyone” or “Authenticated Users” permissions
  • Write access to system folders
  • Executable locations with weak ACLs

📁 Output Files

  • permission_audit.txt
  • permission_audit.json
  • Timestamped directory

🗂 sys_integrity_check.ps1

⭐ What This Script Provides

🔐 File Integrity Analysis

  • Hashing critical system binaries
  • Detecting tampering or modification
  • Driver signature integrity checks

🛡 Security Component Validation

  • Defender status
  • Security service health
  • Protection feature validation

📁 Output Files

  • sys_integrity_check.txt
  • sys_integrity_check.json
  • Timestamped directory

🔥 firewall_audit.ps1

⭐ What This Script Provides

🚧 Firewall Rule Visibility

  • Inbound/outbound rule listing
  • Active vs inactive rules
  • Allowed applications and services

🚨 Risk Indicators

  • Any→Any rules
  • Wide-open inbound ports
  • Exposed services
  • Disabled firewall profiles

📁 Output Files

  • firewall_audit.txt
  • firewall_audit.json
  • Timestamped directory

🧪 powershell_log_audit.ps1

⭐ What This Script Provides

🕵️ PowerShell Event Log Analysis

  • Scriptblock logging (4104)
  • Module logs (4103)
  • Engine lifecycle logs
  • Process creation correlations

🚨 Suspicious Indicators

  • Encoded commands
  • Obfuscated PowerShell
  • Untrusted script sources

📁 Output Files

  • powershell_log_audit.txt
  • powershell_log_audit.json
  • Timestamped directory

🛡 malware_hunt.ps1

⭐ What This Script Provides

🦠 Host-Based Threat Hunting

  • Unsigned or suspicious processes
  • Abnormal parent/child process chains
  • LOLBin exploitation
  • Known malware behavior patterns

📂 Filesystem Indicators

  • Suspicious EXEs in AppData/Temp
  • Recent executable creations
  • Staging directories

📁 Output Files

  • malware_hunt.txt
  • malware_hunt.json
  • Timestamped directory

🌐 network_threat_hunt.ps1

⭐ What This Script Provides

🌍 Network IOC Detection

  • Repeated outbound beaconing
  • Long-lived suspicious sessions
  • C2-like timing patterns
  • Odd port/protocol usage

🧩 Network → Process Mapping

  • Unsigned processes making connections
  • Hidden parent processes
  • Suspicious binaries contacting remote hosts

📁 Output Files

  • network_threat_hunt.txt
  • network_threat_hunt.json
  • Timestamped directory

🧷 wmi_audit.ps1

⭐ What This Script Provides

📡 WMI Forensics

  • WMI event filters
  • Command-line consumers
  • Permanent subscriptions
  • Rogue namespaces

🚨 Persistence Indicators

  • Fileless malware
  • Stealthy long-term implants

📁 Output Files

  • wmi_audit.txt
  • wmi_audit.json
  • Timestamped directory

🪝 autoruns_full_audit.ps1

⭐ What This Script Provides

🔁 Persistence Enumeration

  • Run / RunOnce keys
  • Startup folders
  • Services & drivers
  • Scheduled tasks
  • WMI autostarts

🚨 Suspicious Indicators

  • AppData/Temp startup executables
  • Missing or unsigned binaries
  • Encoded commands

📁 Output Files

  • autoruns_full_audit.txt
  • autoruns_full_audit.json
  • Timestamped directory

🛠️ Tier 3 — Engineering Tools This tier contains system maintenance, configuration auditing, scheduled task analysis, backup inspection, storage diagnostics, and health-review tools. Each tool includes a structured **“What This Script Provides”** section summarizing capabilities, insights, and output formats.

📌 Scripts Included


📅 scheduled_tasks_maintenance.ps1

⭐ What This Script Provides

🔧 Scheduled Task Visibility

  • Full task inventory
  • Last/next run timestamps
  • Exit codes and run history
  • Disabled task detection

🚨 Failure Indicators

  • Non-zero task results
  • Tasks missing run-as credentials
  • Tasks failing repeatedly

📈 Scheduling Insights

  • Chronological next-run overview
  • Startup/logon task breakdown

📁 Output Files

  • scheduled_tasks_maintenance.txt
  • scheduled_tasks_maintenance.json
  • Timestamped output directory

🧩 driver_report.ps1

⭐ What This Script Provides

🔍 Driver Inventory

  • Version
  • Provider
  • Driver date
  • INF source

🔐 Security & Integrity

  • Signed vs unsigned status
  • Outdated driver identification
  • Potentially unsafe or orphaned drivers

⚙️ Service-Level Insights

  • Driver service state
  • Load type & configuration

📁 Output Files

  • driver_report.txt
  • driver_report.json
  • Timestamped output directory

📂 directory_size_report.ps1

⭐ What This Script Provides

📦 Storage Usage Breakdown

  • Total directory size
  • File count & average size
  • Recursive folder traversal

🚨 Space Consumption Indicators

  • Largest files (Top-N)
  • Largest directories
  • Overgrown cache/log folders

📊 Optimization Insights

  • Cleanup candidates
  • Size-based impact analysis

📁 Output Files

  • directory_size_report.txt
  • directory_size_report.json
  • Timestamped output directory

🔐 permission_audit.ps1

⭐ What This Script Provides

🔍 ACL Visibility

  • File/folder permission mapping
  • Explicit vs inherited breakdown
  • Identity → Rights mapping

🚨 Risk Indicators

  • Weak ACLs
  • Insecure inheritance
  • Access-denied objects

🧩 Troubleshooting Insights

  • Missing or broken ACL entries
  • Failing paths recorded separately

📁 Output Files

  • permission_audit.txt
  • permission_audit.json
  • Timestamped output directory

🧹 storage_files_cleanup.ps1

⭐ What This Script Provides

🕒 Age-Based Cleanup

  • Old files older than X days
  • Abandoned logs/caches

📦 Size-Based Cleanup

  • Large files exceeding size threshold
  • Oversized media/log objects

🧩 Temp & Cache Identification

  • .tmp, .bak, .old, .log, .cache

🧨 Optional Deletion Mode

  • Safe structured cleanup
  • Full action-by-action status

📁 Output Files

  • storage_files_cleanup.txt
  • storage_files_cleanup.json
  • Timestamped output directory

♻️ backup_config.ps1

⭐ What This Script Provides

💾 Backup Visibility

  • Windows Backup (wbadmin) status
  • File History configuration

🧩 Restore Infrastructure Review

  • Restore point storage
  • Shadow storage allocation

📝 System Readiness Insights

  • Backup health
  • Missing configuration detection

📁 Output Files

  • backup_config.txt
  • backup_config.json
  • Timestamped output directory

🪄 restore_point_manager.ps1

⭐ What This Script Provides

📅 Restore Point Management

  • List restore points
  • Create new restore points

🧹 Cleanup Automation

  • Delete older restore points
  • Keep newest N

📊 VSS Insights

  • Shadow storage allocation
  • Usage vs maximum size

📁 Output Files

  • restore_point_manager.txt
  • restore_point_manager.json
  • Timestamped output directory

🗄 registry_backup.ps1

⭐ What This Script Provides

💾 Full Registry Hive Backup

  • SYSTEM
  • SOFTWARE
  • SAM
  • SECURITY
  • HKCU

🧩 Backup Integrity

  • Timestamped archive names
  • Per-hive status reporting

🔧 Automation Support

  • Export directory auto-creation
  • Clean error-handling

📁 Output Files

  • registry_backup.txt
  • registry_backup.json
  • Timestamped backup directory

🗃 system_log_archive.ps1

⭐ What This Script Provides

📥 Event Log Collection

  • Application
  • System
  • Setup
  • Security (optional)

📄 System Log Archiving

  • CBS.log
  • DISM.log
  • WindowsUpdate.log

🕒 Timestamped Archive Folders

  • Prevents overwrite
  • Supports case documentation

📁 Output Files

  • system_log_archive.txt
  • system_log_archive.json
  • Timestamped output directory

🛠 patch_status.ps1

⭐ What This Script Provides

📅 Patch Visibility

  • Installed KB list
  • Pending updates
  • Update release metadata

🧩 Update History

  • Success/failure tracking
  • Install timestamps

🛡 Servicing Health

  • DISM servicing status
  • Component-store corruption checks

📁 Output Files

  • patch_status.txt
  • patch_status.json
  • Timestamped output directory

🔬 Tier 4 — Deep Dive

This tier contains deep-level diagnostic utilities designed for advanced troubleshooting, crash analysis, forensic reconstruction, and rootkit detection.
Each tool includes a structured “What This Script Provides” section summarizing its capabilities, insights, and output formats.


📌 Scripts Included


💥 app_crash_report.ps1

⭐ What This Script Provides

🔍 Application Crash Analysis

  • Application Error events (Event ID 1000)
  • Windows Error Reporting failure events (Event ID 1001)
  • Faulting module, path, and exception code
  • Crash bucket and WER metadata

🧠 WER (Windows Error Reporting) Collection

  • Local crash archive scanning
  • Crash directory metadata
  • Historical crash patterns

📉 Reliability Monitor Integration

  • Application reliability events
  • System-wide crash trends
  • Chronological failure events

📁 Output Files

  • app_crash_report.txt
  • app_crash_report.json
  • Timestamped output directory

🧨 bsod_report.ps1

⭐ What This Script Provides

💥 BSOD Crash Event Analysis

  • Kernel-Power (Event ID 41)
  • BugCheck (Event ID 1001)
  • Crash dump association
  • Blue screen frequency analysis

🧩 Minidump Insights

  • Minidump file listing
  • Dump timestamps and sizes
  • File system crash artifacts

🚨 Root Cause Indicators

  • BugCheck stop codes
  • Faulting driver patterns
  • Power failures and hardware symptoms

📁 Output Files

  • bsod_report.txt
  • bsod_report.json
  • Timestamped output directory

🕵️ rootkit_scan.ps1

⭐ What This Script Provides

🔍 Kernel-Level Threat Detection

  • Unsigned kernel drivers
  • Drivers loaded from suspicious paths
  • Running drivers bypassing system32

🧩 Hidden Process Identification

  • Session 0 user-mode processes
  • Parentless processes
  • Phantom background tasks

🧪 Persistence Abuse Indicators

  • Autoruns from Temp/AppData
  • Unexpected Run/RunOnce entries
  • Stealthy startup mechanisms

📁 Output Files

  • rootkit_scan.txt
  • rootkit_scan.json
  • Timestamped output directory

🗂️ mft_timeline_collect.ps1

⭐ What This Script Provides

🕒 Filesystem Timeline Reconstruction

  • File creation timestamps
  • Modification timestamps
  • MFT timestamp events
  • NTFS metadata collection

📚 Forensic USN Journal Parsing

  • Create, delete, rename events
  • Rapid file changes
  • Suspicious activity bursts

🛡 Compromise Investigation Indicators

  • Malware drop detection
  • Persistence file changes
  • Evidence of tampering or wipe activity

📁 Output Files

  • mft_timeline_collect.txt
  • mft_timeline_collect.json
  • Timestamped output directory

🧪 Tier 5 — Expert Tools This tier contains advanced enterprise-grade diagnostic and data-collection utilities designed for senior technicians and escalation engineers. Each tool includes a structured **“What This Script Provides”** section summarizing capabilities, insights, and output formats.

📌 Scripts Included


🛰️ remote_support_tool.ps1

⭐ What This Script Provides

📡 Remote Support System Snapshot

  • Core OS and build information
  • System architecture and configuration
  • Hardware + platform metadata

🌐 Network Context

  • Adapter configuration
  • IP, DNS, gateway details
  • Interface operational status

🧵 Process Activity Overview

  • Active processes
  • CPU + memory insights
  • Vendor/signed process metadata

📦 Installed Software Inventory

  • Full application list
  • Display name, version, publisher
  • Useful for compatibility review

🚨 Recent Critical Events

  • System-level errors
  • Hardware and kernel warnings
  • Failure correlation clues

📁 Output Files

  • remote_support_tool.txt
  • remote_support_tool.json
  • Timestamped output directory

🧬 comprehensive_system_report.ps1

⭐ What This Script Provides

🖥 Advanced System Diagnostics

  • OS version + build
  • Computer information snapshot
  • Memory + architecture

🏷 Hardware Inventory

  • Manufacturer and model
  • Installed RAM
  • System identifiers

🌐 Network Diagnostics

  • NIC link speed
  • Adapter status
  • MAC address enumeration

💽 Storage & Disk Usage

  • Free/used disk capacity
  • Drive performance indicators

🔧 Driver & Service Overview

  • Driver provider + version
  • Service start modes
  • Running/stopped states

🛠 Patch Status & Update History

  • Installed KBs
  • Update descriptions
  • Patch age indicators

🚨 Critical Event Log Summary

  • Kernel-level failures
  • Power events
  • Hardware error history

📁 Output Files

  • comprehensive_system_report.txt
  • comprehensive_system_report.json
  • Timestamped output directory


🚀 Getting Started



📘 Usage Examples



📂 Supported Operating Systems



🤝 Contributing



📜 License