Releases · Beercow/XstReader
XstReader is an open source viewer for Microsoft Outlook’s .ost and .pst files (also those protected by unknown password). You can view and inspect all content and export messages and attachments (...
Made an update to XstReader. It was unusable with larger ost files. It now loads large ost files in seconds making it usable again. Have a pull request in but not counting on it being accepted due to inactivity. Let me know what you think. #DFIR
github.com/Beercow/XstR...
06.03.2026 03:02
👍 0
🔁 0
💬 0
📌 0
When you get a group text and fix the name and picture for them.
22.12.2025 14:23
👍 1
🔁 0
💬 0
📌 0
Fixed a bug in DeXRAY for Windows Defender files. 🙂
www.hexacorn.com/blog/2025/12...
07.12.2025 04:02
👍 0
🔁 0
💬 0
📌 0
Fixed a bug in DeXRAY for Windows Defender files. 🙂
www.hexacorn.com/blog/2025/12...
03.12.2025 21:47
👍 0
🔁 0
💬 0
📌 0
13Cubed XPlat Bundle and T-Shirt giveaway.
📢 I partnered with @13cubed.bsky.social for another giveaway! 🎁
🏆 1 winner will receive a 13Cubed Investigator T-Shirt + the XPlat Bundle Complete
👕 5 winners will receive 13Cubed Investigator T-Shirts
To Enter: Like, Comment, and Repost
#DFIR #DigitalForensics #IncidentResponse
01.12.2025 20:06
👍 10
🔁 9
💬 9
📌 1
Woot!
01.12.2025 23:24
👍 0
🔁 0
💬 0
📌 0
When launching a program as admin, consent.exe runs with a parent process of svchost. If successful, consent.exe exits and the new process is launched with explorer as its parent. If not, we can’t always tell what was trying to be ran. Until now. github.com/Beercow/Cons...
20.11.2025 04:20
👍 2
🔁 1
💬 0
📌 0
When launching a program as admin, consent.exe runs with a parent process of svchost. If successful, consent.exe exits and the new process is launched with explorer as its parent. If not, we can’t always tell what was trying to be ran. Until now. github.com/Beercow/Cons...
20.11.2025 04:20
👍 2
🔁 1
💬 0
📌 0
Into the unknown and down rabbit holes we go.
19.11.2025 03:35
👍 0
🔁 0
💬 0
📌 0
Adding a parser for Microsoft.FilesOnDemand.db to OneDriveExplorer. Yet another source to rebuild the user’s OnDrive. More to come. #DFIR
16.10.2025 03:43
👍 1
🔁 0
💬 0
📌 0
*but
04.10.2025 02:27
👍 0
🔁 0
💬 0
📌 0
Correct me if I’m wrong bit what you described is Xbox from day one.
04.10.2025 02:27
👍 0
🔁 0
💬 1
📌 0
That time of year again when everybody starts abbreviating cybersecurity awareness month as CSAM. 21 pages deep of google searches for that term and not a single mention of cybersecurity awareness month. Go figure.
23.09.2025 21:48
👍 0
🔁 0
💬 0
📌 0
Appears OneDrive snuck a new sync client in. Works with personal accounts at the moment. It’s WebView2. You can find data in the following locations:
AppData\Local\Microsoft\OneDrive\OD4
AppData\Local\Microsoft\OneDrive\Logs\OD4
Where are my browser forensics experts at? #DFIR
11.08.2025 18:29
👍 0
🔁 1
💬 0
📌 0
Updated OneDrive Evolution. You can now compare two versions of OneDrive and see what has changed. #DFIR
malwaremaloney.blogspot.com/p/onedrive-e...
07.08.2025 03:02
👍 0
🔁 0
💬 0
📌 0
Today we learned Fishrocket (the one with the doughnut) has cancer. It’s an aggressive form of mast cell tumors. Treatment usually involves removing them but there are too many. They prescribe prednisone because they itch. Has diabetes so can’t give him prednisone. Poor guy.
20.06.2025 00:19
👍 0
🔁 0
💬 0
📌 0
1/ I successfully tested a LSASS dumping technique on a Windows 10 lab machine, which we encountered on a recent Incident Response engagement (no EDR, default Defender installed).
The "MiniDumpWriteDump" technique, as described here [1], was successful in writing the LSASS process to disk.
19.06.2025 08:33
👍 0
🔁 1
💬 1
📌 0
Another interesting forensic artifact in OneDrive. UXDatabase.db
18.06.2025 19:30
👍 0
🔁 0
💬 0
📌 0
New folder and databases in the OneDrive sync client. Not sure what feature they are tied to yet. More to come. #DFIR
05.06.2025 02:02
👍 1
🔁 0
💬 0
📌 0
New laptop, new stickes. 😜
03.06.2025 02:14
👍 0
🔁 0
💬 0
📌 0