Statically analyzes Windows executable files to look for use of DEP and ASLR. The lack of either indicates possible bad software development practices which pose security risks.
These are free protections provided by Microsoft. Not taking advantage of them is foolish.
To use, drag and drop Windows executables onto this page. If you use Chrome, you can drag and drop entire directories in
C:\Program Files\. (Dropping your entire C:\ drive will crash your browser).
For developersData Execution Prevention (DEP) can be turned on by compiling with any Visual Studio version since 2005 and ensure NXCOMPAT is on (default).
Address Space Layout Randomization (ASLR) can be turned on by compiling with any Visual Studio version since 2005 and ensure DYNAMICBASE in on (default).