![hackintool ket with invalid signatured hackintool ket with invalid signatured](https://connective.eu/wp-content/uploads/How-do-digital-signatures-work-scheme-02.png)
s, -status= Enable the status server on the specified port p, -fexclude= Do not scan files whose names match this regex a, -finclude= Only scan files whose names match this regex t, -term Format output to fit the terminal window c, -csv Log results to file in CSV format g, -swap= Reverse every n bytes before scanning
![hackintool ket with invalid signatured hackintool ket with invalid signatured](https://port135.com/wp-content/uploads/2019/12/Service-specific-error-code-2146893818-768x406.jpg)
O, -base= Add a base address to all printed offsets o, -offset= Start scan at this file offset P, -partial Perform a superficial, but faster, scan Z, -lzma Scan for raw LZMA compression streams X, -deflate Scan for raw deflate compression streams w, -terse Diff all files, but only display a hex dump of the first file u, -similar Only display lines that are the same between all files U, -blue Only show lines containing bytes that are different among some files i, -red Only show lines containing bytes that are different among all files G, -green Only show lines containing bytes that are the same among all files W, -hexdump Perform a hexdump / diff of a file or files
![hackintool ket with invalid signatured hackintool ket with invalid signatured](https://img2.helpnetsecurity.com/posts2019/document-signed-modified.jpg)
L, -low= Set the falling edge entropy trigger threshold (default: 0.85) H, -high= Set the rising edge entropy trigger threshold (default: 0.95) N, -nplot Do not generate an entropy plot graph Q, -nlegend Omit the legend from the entropy plot graph F, -fast Use faster, but less detailed, entropy analysis V, -subdirs Extract into sub-directories named by the offset z, -carve Carve data from files, but don't execute extraction utilities r, -rm Delete carved files after extraction n, -count= Limit the number of extracted files j, -size= Limit the size of each extracted file C, -directory= Extract files/folders to a custom directory (default: current working directory) d, -depth= Limit matryoshka recursion depth (default: 8 levels deep) M, -matryoshka Recursively scan extracted files D, -dd= Extract signatures (regular expression), give the files an extension of, and execute e, -extract Automatically extract known file types y, -include= Only show results that match x, -exclude= Exclude results that match I, -invalid Show results marked as invalid b, -dumb Disable smart signature keywords m, -magic= Specify a custom magic file to use A, -opcodes Scan target file(s) for common executable opcode signatures R, -raw= Scan target file(s) for the specified sequence of bytes B, -signature Scan target file(s) for common file signatures k, -continue Don't stop at the first match T, -minsn= Minimum number of consecutive instructions to be considered valid (default: 500) Y, -disasm Identify the CPU architecture of a file using the capstone disassembler