Cybersecurity Incident Response & Endpoint Diagnostics

Web Link Communications Security Inspector .NET 6

Safely inspect and analyze suspicious web links from email or other messages before opening them in your web browser. This application inspects communications used in URIs without compromising your endpoint security and privacy. Just read and accept the built-in EULA to use the application's fully enabled features. A User's Guide is bundled along with the Application in the .zip file.

Executable application • v1.3.2.0 Revision date: 2022-05-17

SHA-256: 2186f8898e92517f1838a3d1bc10c81a96be35d2bc052ee5023be26d3423df19

The application may be used at no cost after reading and accepting the built-in EULA. Web Link Communications Security Inspector safely provides useful analytical information on web link communications whether you use it in a professional setting or personally from your own computer. In addition to analyzing suspicious web links from your email or other messaging system, you can also use this application to diagnose or validate communications with your company webservers or with your personal webserver before setting them up live on the Internet. This application may also be useful in security awareness training scenarios, to illustrate how the security of protocols used often varies from link-to-link or when client or server configurations place constraints on TLS negotiation.

Web Link Communications Security Inspector
DOWNLOAD NOW

Recently Created or Modified Executables Search .NET 6

Inspect executable modules created or modified on your computer during a recent time window (cybersecurity incident time) you select. Returns each module's metadata along with the file's SHA-256 value. Helps discover file artifacts from malware incidents.

Executable application • v2.1.0.2 Revision date: 2022-06-20

SHA-256: 

239fbc57cafdadeec735bf12aa1453b5c8858af16286c8606c8a7d2c7340bc22

This application may be used at no cost after reading and accepting the built-in EULA. Write access to the Application's working directory is required for the product license file. Uniquely identify executable modules, file artifacts, deposited by System processes and unsafe user activity during a Cybersecurity incident time. Helps associate modules with unsafe or risky applications. Intended target audience: Cybersecurity, Network, Systems Analysts, and similar technical users.

Resently Created or Modified Executables Search
DOWNLOAD NOW

Internet Processes Viewer .NET 6

Retrieves detailed snapshots of your computer’s active TCP & UDP network connections. Connection creation times, owning processes & their loaded modules, and user accounts can be easily collected each time you run it. Get quick results with a level of detail helpful when analyzing Cybersecurity incidents and troubleshooting network applications.

Executable application • v3.8.6.0 Revision date: 2022-08-06

SHA-256:

f08da99be3c1efb37849d793db9e3cfa15da85ba215aeb8afb4c9f70533bd579

This application may be used at no cost after reading and accepting the built-in EULA. Typical write access to your interactive user's HKCU Software registry is required for the product license acceptance. Uniquely identify executable modules used in creating and maintaining suspicious network connections. Provide .csv reports from the application running on an endpoint of interest to your Cybersecurity support team. Intended target audience: Cybersecurity, Network, Systems Analysts, and similar technical users.

Internet Processes Viewer
DOWNLOAD NOW
All applications on this site are ©Steve Chaison • All rights reserved
Please refer to the file SHA-256 values on this site along with the certificate to verify safety and authenticity.

 

Acceptance of each application's built-in EULA is required before use

Steve Chaison Software
00:00 / 00:11

Listed on