<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>WindowsSCOPE</title>
	<atom:link href="https://www.windowsscope.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.windowsscope.com</link>
	<description>Memory Forensics Tools &#124; Incident Response</description>
	<lastBuildDate>Fri, 03 Nov 2017 20:00:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.windowsscope.com/wp-content/uploads/2018/11/cropped-WindowsSCOPE-Square-32x32.png</url>
	<title>WindowsSCOPE</title>
	<link>https://www.windowsscope.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WindowsSCOPE Cyber Forensics 3.2 Now Available</title>
		<link>https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble-2/</link>
					<comments>https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble-2/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Tue, 15 Aug 2017 14:13:04 +0000</pubDate>
				<category><![CDATA[Products]]></category>
		<guid isPermaLink="false">http://www.windowsscope.com/?p=7720</guid>

					<description><![CDATA[<p>A new version of WindowsSCOPE Cyber Forensics is now available. WindowsSCOPE version 3.2 now includes support for the latest versions of Windows operating systems through Windows 10. Also included with version 3.2 is WindowsSCOPE&#8217;s data search tool. Use it to find URLs, credit cards, email addresses, phone numbers,  and other digital forensic artifacts hidden memory.</p>
The post <a href="https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble-2/">WindowsSCOPE Cyber Forensics 3.2 Now Available</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Automated Rootkit Detection with ThreatSCOPE</title>
		<link>https://www.windowsscope.com/automated-rootkit-detection-with-threatscope/</link>
					<comments>https://www.windowsscope.com/automated-rootkit-detection-with-threatscope/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Wed, 27 Jul 2016 10:23:29 +0000</pubDate>
				<category><![CDATA[Use Cases]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/automated-rootkit-detection-with-threatscope/</guid>

					<description><![CDATA[<p>This article will show how you can use the ThreatSCOPE feature of WindowsSCOPE to detect rootkits installed on a system. One of the difficulties in detecting rootkits and other advanced malware is that they’re often packed, encrypted, or injected by other means than being run from an executable file on the disk. This means they [&#8230;]</p>
The post <a href="https://www.windowsscope.com/automated-rootkit-detection-with-threatscope/">Automated Rootkit Detection with ThreatSCOPE</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/automated-rootkit-detection-with-threatscope/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WindowsSCOPE Cyber Forensics Ultimate 64-Bit Now Available</title>
		<link>https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble/</link>
					<comments>https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Mon, 25 Jul 2016 10:23:29 +0000</pubDate>
				<category><![CDATA[Products]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble/</guid>

					<description><![CDATA[<p>The latest addition to the WindowsSCOPE product lineup, Cyber Forensics Ultimate, is now available at the online store. This new version incorporates all the interactive features of previous versions, including system-wide disassembly and control flow graphing of both user and kernel space. The 64-bit version enables support for importing memory dumps taken from any 64-bit [&#8230;]</p>
The post <a href="https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble/">WindowsSCOPE Cyber Forensics Ultimate 64-Bit Now Available</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/windowsscope-cyber-forensics-ultimate-64-bit-now-availalble/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New WindowsSCOPE Product &#8211; CaptureGUARD Gateway</title>
		<link>https://www.windowsscope.com/new-windowsscope-product-captureguard-gateway/</link>
					<comments>https://www.windowsscope.com/new-windowsscope-product-captureguard-gateway/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Mon, 25 Jul 2016 10:23:29 +0000</pubDate>
				<category><![CDATA[Products]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/new-windowsscope-product-captureguard-gateway/</guid>

					<description><![CDATA[<p>WindowsSCOPE now offers PCI Express and ExpressCard platforms capable of imaging physical memory and providing other cyber security related capabilities even in locked computers.  CaptureGUARD Gateway can be customized for various advanced cyber security and forensics use-cases not possible with other solutions on the market. Please contact us at support@windowsscope.com to explore how these capabilities [&#8230;]</p>
The post <a href="https://www.windowsscope.com/new-windowsscope-product-captureguard-gateway/">New WindowsSCOPE Product – CaptureGUARD Gateway</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/new-windowsscope-product-captureguard-gateway/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bypassing Windows Login Passwords with CaptureGUARD Gateway for Forensic Acquisition</title>
		<link>https://www.windowsscope.com/bypassing-windows-login-passwords-with-captureguard-gateway-for-forensic-acquisition-2/</link>
					<comments>https://www.windowsscope.com/bypassing-windows-login-passwords-with-captureguard-gateway-for-forensic-acquisition-2/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Wed, 20 Jul 2016 10:23:29 +0000</pubDate>
				<category><![CDATA[Products]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/bypassing-windows-login-passwords-with-captureguard-gateway-for-forensic-acquisition/</guid>

					<description><![CDATA[<p>Live memory acquisition is becoming increasingly important for digital investigations. One of the biggest obstacles with memory acquisition, however, is that in many cases a computer under investigation is locked, requiring a password that is not available. CaptureGUARD Gateway enables investigators to overcome this challenge by allowing them to log into a computer without knowing [&#8230;]</p>
The post <a href="https://www.windowsscope.com/bypassing-windows-login-passwords-with-captureguard-gateway-for-forensic-acquisition-2/">Bypassing Windows Login Passwords with CaptureGUARD Gateway for Forensic Acquisition</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/bypassing-windows-login-passwords-with-captureguard-gateway-for-forensic-acquisition-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New WindowsSCOPE Memory Forensics Training Videos Available</title>
		<link>https://www.windowsscope.com/new-windowsscope-memory-forensics-training-videos-available/</link>
					<comments>https://www.windowsscope.com/new-windowsscope-memory-forensics-training-videos-available/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Wed, 18 May 2016 10:23:29 +0000</pubDate>
				<category><![CDATA[Tutorial videos]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/new-windowsscope-memory-forensics-training-videos-available/</guid>

					<description><![CDATA[<p>Two new tutorial videos are now publicly available on the WindowsSCOPE websiite &#8211; &#8220;Using WindowsSCOPE to Investigate 64-Bit Virtual Memory Management&#8221; and &#8220;Using WindowsSCOPE to Analyze the Shadow Walker Rootkit&#8221;. With 64-bit computers becoming increasingly common, the Introduction to 64-Bit Virtual Memory Management video will bring you up to speed on how Windows memory management [&#8230;]</p>
The post <a href="https://www.windowsscope.com/new-windowsscope-memory-forensics-training-videos-available/">New WindowsSCOPE Memory Forensics Training Videos Available</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/new-windowsscope-memory-forensics-training-videos-available/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Reverse Engineering the Vanquish Rootkit &#8211; Part 2</title>
		<link>https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-2/</link>
					<comments>https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-2/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Wed, 20 Apr 2016 10:23:29 +0000</pubDate>
				<category><![CDATA[Use Cases]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/reverse-engineering-the-vanquish-rootkit-part-2/</guid>

					<description><![CDATA[<p>If you followed our prior post on the Vanquish rootkit, you might remember how we identified anomalies in a system that led us to finding a Vanquish rootkit infection. You can go back to Part 1 and review it on your own, but here is a quick summary of how we discovered the rootkit: Found [&#8230;]</p>
The post <a href="https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-2/">Reverse Engineering the Vanquish Rootkit – Part 2</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Reverse Engineering the Vanquish Rootkit &#8211; Part 1</title>
		<link>https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-1/</link>
					<comments>https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-1/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Mon, 18 Apr 2016 10:23:30 +0000</pubDate>
				<category><![CDATA[Use Cases]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/reverse-engineering-the-vanquish-rootkit-part-1/</guid>

					<description><![CDATA[<p>The first warning sign that we noticed in this snapshot was in the process for cmd.exe (this is for a Windows command line window). See below for a screenshot of the contents of this process:</p>
The post <a href="https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-1/">Reverse Engineering the Vanquish Rootkit – Part 1</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/reverse-engineering-the-vanquish-rootkit-part-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Introduction to Windows Kernel: Review IDT, SSDT and other Structures</title>
		<link>https://www.windowsscope.com/introduction-to-windows-kernel/</link>
					<comments>https://www.windowsscope.com/introduction-to-windows-kernel/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Fri, 18 Mar 2016 10:23:30 +0000</pubDate>
				<category><![CDATA[Tutorial videos]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/introduction-to-windows-kernel/</guid>

					<description><![CDATA[<p>You can access the video here.</p>
The post <a href="https://www.windowsscope.com/introduction-to-windows-kernel/">Introduction to Windows Kernel: Review IDT, SSDT and other Structures</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/introduction-to-windows-kernel/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Introduction to WindowsSCOPE Live</title>
		<link>https://www.windowsscope.com/introduction-to-windowsscope-live/</link>
					<comments>https://www.windowsscope.com/introduction-to-windowsscope-live/#respond</comments>
		
		<dc:creator><![CDATA[BlueRiSC]]></dc:creator>
		<pubDate>Thu, 18 Feb 2016 10:23:30 +0000</pubDate>
				<category><![CDATA[Products]]></category>
		<guid isPermaLink="false">http://localhost/wordpress/2016/07/18/introduction-to-windowsscope-live/</guid>

					<description><![CDATA[<p>Step 1 – Setting up your WindowsSCOPE Live Server The first step in getting WindowsSCOPE Live running is to download and install the WindowsSCOPE Live server. You can get the server on the WindowsSCOPE downloads page, here, after registering. To install WindowsSCOPE Live Server, simply run the installer and follow the steps. Then run the [&#8230;]</p>
The post <a href="https://www.windowsscope.com/introduction-to-windowsscope-live/">Introduction to WindowsSCOPE Live</a> first appeared on <a href="https://www.windowsscope.com">WindowsSCOPE</a>.]]></description>
		
					<wfw:commentRss>https://www.windowsscope.com/introduction-to-windowsscope-live/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Minified using Disk

Served from: www.windowsscope.com @ 2026-05-03 08:56:48 by W3 Total Cache
-->