Tag Archives: forensics
Extract resources from Windows binaries

Resource Hacker™ has been designed to be the complete resource editing tool: compiling, viewing, decompiling and recompiling resources for both…

Detect packers, cryptors and compilers

PEiD is used to detect most common packers, cryptors and compilers found in PE executable files. The current version of…

Detect executable dependencies

Dependency Walker – scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree…

Viewing strings in executables

strings – utility displays strings of printable characters found in file(s). Strings is available in Linux, Unix and Windows Systems….

Show all dynamic libraries required by executable

ldd is used to list the shared libraries required by programs. ldd should never be used with untrusted executables. Instead…

Scan windows for suspicious executable images

> Download Sysinternals Suite. > Run command line tool(cmd) with administrative privileges. > To scan Windows for unverified binary images,…

List symbols from binary files

nm is used to examine binary files and to display the contents of those files, meta information, names of functions…

How to identify unknown file type

You should never rely on a filename extension to determine what a file is or what is supposed to “do”…

Previous Page