30/10/15. Version 0.1
“Quick and dirty” script to check for certificate fingerprints. Malware is using signed binaries to attack Windows systems. They need it to get into the roots of the operative systems. So attackers steal or create their own certificates. Everything counts to “look good” for the users and machines. Sometimes, when they discover a famous signed binary, you may wonder if any of the binaries in your machine is signed with that certificate. This is a simple powershell script to get that.