SwishDbgExt Logo

SwishDbgExt

SwishDbgExt is a Microsoft WinDbg debugging extension that enhances debugging capabilities for kernel developers, troubleshooters, and security experts.

393
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

SwishDbgExt Description

SwishDbgExt is a Microsoft WinDbg debugging extension that expands the set of available commands by Microsoft WinDbg, but also fixes and improves existing commands. This extension has been developed by Matt Suiche (@msuiche) – feel free to reach out on support@comae.io ask for more features, offer to contribute and/or report bugs. SwishDbgExt aims at making life easier for kernel developers, troubleshooters and security experts with a series of debugging, incident response and memory forensics commands. Because SwishDbgExt is a WinDbg debugging extension, it means it can be used on local or remote kernel debugging session, live sessions generated by Microsoft LiveKd, but also on Microsoft crash dumps generated to a Blue Screen of Death or hybrid utilities such as Comae DumpIt. More information on https://blog.comae.io/comae-2016-contest-swishdbgext-features-3c9a63c62209#.tnt1b9usx Installation: You can either copy the WinDbg extension in the corresponding (x86 or x64) WinDbg folder or load it manually using the !load command such as below. Please note you can’t have spaces or quotes in the full path to the target dll to be loaded. !load X:\FullPath\SwishDbg

SwishDbgExt FAQ

Common questions about SwishDbgExt including features, pricing, alternatives, and user reviews.

SwishDbgExt is SwishDbgExt is a Microsoft WinDbg debugging extension that enhances debugging capabilities for kernel developers, troubleshooters, and security experts.. It is a Security Operations solution designed to help security teams with Memory Forensics.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

WindowsSCOPE Logo

A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

0
Aurora Incident Response Logo

Incident Response Documentation tool for tracking findings and tasks.

0
libsmdev Logo

A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.

0
Volatility 3 Logo

A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.

0
PSRecon Logo

A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox