Cybersecurity Incident Response & Endpoint Diagnostics
Web Link Communications Security Inspector .NET 6
Safely inspect and analyze suspicious web links from email or other messages before opening them in your web browser. This application inspects communications used in URIs without compromising your endpoint security and privacy. Just read and accept the built-in EULA to use the application's fully enabled features. A User's Guide is bundled along with the Application in the .zip file.
Executable application • v18.104.22.168 Revision date: 2022-05-17
The application may be used at no cost after reading and accepting the built-in EULA. Web Link Communications Security Inspector safely provides useful analytical information on web link communications whether you use it in a professional setting or personally from your own computer. In addition to analyzing suspicious web links from your email or other messaging system, you can also use this application to diagnose or validate communications with your company webservers or with your personal webserver before setting them up live on the Internet. This application may also be useful in security awareness training scenarios, to illustrate how the security of protocols used often varies from link-to-link or when client or server configurations place constraints on TLS negotiation.
Recently Created or Modified Executables Search .NET 6
Inspect executable modules created or modified on your computer during a recent time window (cybersecurity incident time) you select. Returns each module's metadata along with the file's SHA-256 value. Helps discover file artifacts from malware incidents.
Executable application • v22.214.171.124 Revision date: 2022-06-20
This application may be used at no cost after reading and accepting the built-in EULA. Write access to the Application's working directory is required for the product license file. Uniquely identify executable modules, file artifacts, deposited by System processes and unsafe user activity during a Cybersecurity incident time. Helps associate modules with unsafe or risky applications. Intended target audience: Cybersecurity, Network, Systems Analysts, and similar technical users.
Internet Processes Viewer .NET 6
Retrieves detailed snapshots of your computer’s active TCP & UDP network connections. Connection creation times, owning processes & their loaded modules, and user accounts can be easily collected each time you run it. Get quick results with a level of detail helpful when analyzing Cybersecurity incidents and troubleshooting network applications.
Executable application • v126.96.36.199 Revision date: 2022-08-06
This application may be used at no cost after reading and accepting the built-in EULA. Typical write access to your interactive user's HKCU Software registry is required for the product license acceptance. Uniquely identify executable modules used in creating and maintaining suspicious network connections. Provide .csv reports from the application running on an endpoint of interest to your Cybersecurity support team. Intended target audience: Cybersecurity, Network, Systems Analysts, and similar technical users.
All applications on this site are ©Steve Chaison • All rights reserved
Please refer to the file SHA-256 values on this site along with the certificate to verify safety and authenticity.
Acceptance of each application's built-in EULA is required before use