// pkgprobe blog

Installer intel.
Written by practitioners.

Deep dives on Windows installer analysis, endpoint security, software deployment, and the open-source tooling behind pkgprobe.

All Posts 🔍 Analysis 🛡️ Security ⚙️ Deployment 🧰 Tooling 📦 Open Source 📡 CVE Intel
// recent posts
⚙️
Silent Install Switches: Stop Guessing, Start Probing
A practical breakdown of how pkgprobe auto-extracts /quiet, /norestart, and TRANSFORMS flags from MSIs — and why SCCM admins should never manually hunt for them again.
⏱ 5 min
🛡️
Integrating pkgprobe into a Vulnerability Management Workflow
How to wire pkgprobe's CVE output into Tenable or Rapid7 ticket workflows — so vulnerable software is flagged before it's approved for deployment.
⏱ 7 min
📦
MSIX vs MSI vs EXE: What Each Format Reveals (and Hides)
A technical comparison of what pkgprobe can extract from each installer format — and why MSIX's containerized model changes the analysis game entirely.
⏱ 10 min
🗂️
Auditing Registry Writes Before Deployment with pkgprobe
Every MSI leaves a registry footprint. Here's how to use pkgprobe to capture that footprint in advance and build change control documentation automatically.
⏱ 6 min
📊
Why We're Building an Open Installer Intelligence Dataset
The vision behind pkgprobe's community data moat — and why a shared, open corpus of installer analysis data benefits every IT and security team on the planet.
⏱ 4 min
🚀
Validating Installer Artifacts in CI/CD with pkgprobe's Python API
A step-by-step guide to dropping pkgprobe into a GitHub Actions or Azure DevOps pipeline to gate installer artifacts on signature validity and CVE score.
⏱ 9 min
// stay sharp

New posts. No noise.

Get notified when we publish new deep dives on installer security, deployment tooling, and pkgprobe updates. No spam — just signal.

~1 post per month · Unsubscribe anytime