The program can also be run to display all of the executables encountered, regardless of their extensions. This is handy when you're looking for all of the executables on a drive. Other options allow the user to record the strings found in an executable and to work recursively. The manual page has more details.
Here's some sample output. First, we'll search for mislabeled executables:
C:\> missidentify * C:\missidentify-1.0\sample.jpgNext, a search for all executables in a given directory:
C:\> missidentify -a * C:\missidentify-1.0\sample.jpg C:\missidentify-1.0\missidentify.exeAnd finally, searching for all executables in the System directory:
C:\> missidentify -ar c:\windows\system32 ... C:\WINDOWS\System32\ntdll.dll C:\WINDOWS\System32\ntoskrnl.exe C:\WINDOWS\System32\NEVER-GONNA-CATCH-ME.EXE C:\WINDOWS\System32\ntver.dll ...You can download a Windows executable or the source code. The code has been tested on Linux, FreeBSD, Open Solaris, and Mac OS X, but should work on most platforms that support the GNU build tools (e.g. OpenBSD, SunOS, VMS, Amiga, Cray XMP, XBox, etc.) Enjoy!