search
Join or Log In

Windows

Browse 12 cybersecurity tools tagged with "Windows"

LastActivityView

LastActivityView

language

Digital Forensics and Incident Response

LastActivityView on SecurityListing: A tool that collects and displays user activity and system events on a Windows system.

4.5(1)
DiskShadow

DiskShadow

language

Offensive Security

DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

4.5(1)
Verisys File Integirty Monitoring

Verisys File Integirty

language

Security Information and Event Management

Verisys File Integirty Monitoring on SecurityListing: A next-generation file integrity monitoring and change detection system

4.5(1)
Userland API Monitoring and Code Injection Detection

Userland API Monitoring

language

Digital Forensics and Incident Response

Userland API Monitoring and Code Injection Detection on SecurityListing: Explores malware interaction with Windows API and methods for detection and prevention.

4.5(1)
autoruns

autoruns

language

Endpoint Detection and Response

autoruns on SecurityListing: A comprehensive utility that shows what programs are configured to run during system bootup or login, and when you start various built-in Windows applications.

4.5(1)
Echotrail Insights

Echotrail Insights

language

Digital Forensics and Incident Response

Echotrail Insights on SecurityListing: Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

4.3(2)
Intrusion Discovery Cheat Sheet v2.0

Intrusion Discovery Cheat

language

Cheat Sheets

Intrusion Discovery Cheat Sheet v2.0 on SecurityListing: A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.

3.8(1)
ResourcesExtract

ResourcesExtract

language

Digital Forensics and Incident Response

ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files

Using a SCF file to Gather Hashes

Using a SCF

language

Offensive Security

Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

Windows 7 UAC Whitelist Code-Injection Issue

Windows 7 UAC

language

API Security

Windows 7 UAC Whitelist Code-Injection Issue on SecurityListing: Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

Avast Cleanup Premium

Avast Cleanup Premium

language

Endpoint Protection Platform

Avast Cleanup Premium on SecurityListing: PC optimization and cleanup tool for system performance maintenance

Vshadow

Vshadow

language

Offensive Security

Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.