Support

Flush


Flush file system disk cache buffers and manage removable media.  Switch compatible with Sysinternals Sync.exe but free to redistribute.

Usage: flush.exe [OPTIONS] [DRIVES]...

Arguments:  [DRIVES]... Specific drive letters to flush (e.g., 'C:' or 'C: D: F:' or C: D: F:)

Options:        
         -r, --removable Flush removable media in addition to specified/all fixed drives
         -e, --eject   Eject removable media
         -a, --available Display available drives and exit (ignores all other options)
         -h, --help    Print help
         -V, --version  Print version

Specifying no arguments will flush all fixed drives.

If you encounter issues flushing drives, ensure you are running Flush as an administrator and that it has been whitelisted for Controlled Folder Access.



ForceDel


ForceDel - A utility to delete locked files and folders via the Restart Manager API.

Usage: forcedel.exe [OPTIONS] <File/Folder>

Arguments:
  File/Folder pattern to delete (supports wildcards)

Options:
 -r, --recurse Recurse into subdirectories
 -v, --verbose Verbose output
 -h, --help   Print help



Pushover


Pushover is a command-line Windows utility for the Pushover notification service.  It is completely self-contained with no additional dependencies and is ideal for sending alerts from scripts or via other actions within Windows.  It does require a User Key and Application Token that can be requested from within your account on pushover.net.

Usage: pushover.exe [OPTIONS]

Options:
     -m, --message                            The message to send in quotes (required unless config operation)
     -l, --title                                       Message title
     -p, --priority <PRIORITY>          Message priority [default: normal] [possible values: lowest, low, normal, high, emergency]
     -s, --sound <SOUND>               Sound to play (optional) [default: none] [possible values: *see below*] 
     --urltitle <URL_TITLE>              URL title to attach to message
     --url <URL>                                URL to attach to message
     --retry <SECONDS>                  Retry interval in seconds (for emergency priority) [default: 30]
     --expire <SECONDS>                Expire time in seconds (for emergency priority) [default: 3600]
     -t, --token <TOKEN>                  Application token (required if not stored in config)
     -u, --user-key <USER_KEY>     User key (required if not stored in config)
     --save-config                              Store current token and user_key as defaults
     --show-config                             Show current configuration
     -a, --attachment <FILE_PATH>  Path to image file to attach (max 5MB)
     --ttl <SECONDS>                       Time to Live in seconds (auto-delete message after this time)
     --clear-config                              Clear stored configuration
     -h, --help                                     Print help
     -V, --version                                Print version

Available sound options: pushover, bike, bugle, cashregister, classical, cosmic, falling, gamelan, incoming, intermission, magic, mechanical, pianobar, siren, spacealarm, tugboat, alien, climb, persistent, echo, updown, vibrate, none.



SigChk


SigChk is an Authenticode checker for digitally signed executables.  It can check individual files or complete filesystems.

Usage: sigchk.exe [OPTIONS] <File/Folder>

Arguments:
  File or directory path to check

Options: -r, --recursive  Recursively check subdirectories
 -i, --hide    Hide/ignore files without digital signatures
 -c, --csv  Output results to CSV file
 -h, --help    Print help
 -V, --version   Print version



WCMMap


WCMMap is a Windows network share mapping utility that securely stores mapping credentials in the Windows Credential Manager.

Usage: wcmmap.exe <COMMAND> [OPTIONS]

Commands:
 store  Store credentials in Windows Credential Manager
 map   Map a network drive
 check  Check stored credentials for a user
 delete  Delete stored credentials
 list   List all stored credentials
 cleanup Clean up the credential registry
 help   Print this message or the help of the given subcommand(s)

Options:
 -h, --help Print help (see more with '--help')
 -d  Drive letter
 -u  User account
 -r Remote share to map
 --persistent (Automatically map share each time Windows is restarted)
-- yes (Automatically answer yes to system prompts)

EXAMPLES

 Store credentials:
  wcmmap store -u domain\user -r \\server\share

 Map drive with stored credentials (temporary):
  wcmmap map -d Z: -u domain\user -r \\server\share

 Map drive persistently:
  wcmmap map -d Z: -u domain\user -r \\server\share --persistent

 Check all stored credentials for a user:
  wcmmap check -u domain\user

 Check specific stored credentials:
  wcmmap check -u domain\user -r \\server\share

 List all stored credentials:
  wcmmap list

 Clean up registry:
  wcmmap cleanup

 Delete specific credentials:
  wcmmap delete -u domain\user -r \\server\share --yes

 Delete credentials (interactive):
  wcmmap delete -u domain\user





Unpin


Unpin is a command-line tool to set the required attributes for files, folders and subfolders to free local drive space for your OneDrive synced folders. This performs the same task as right-clicking on a OneDrive folder and selecting "Free up space".

This can be useful for automating archival of OneDrive data on your device or for scripting the cleanup of local data on devices in the enterprise.  It is also useful for forcing tiering of data if your company uses Azure File Sync - Note: This will be dependent on your Azure File Sync policies.  

Windows will allow you to set unpin attributes on any file or folder, but it will only be useful for software solutions that utilize this facility.

Usage: unpin.exe [OPTIONS] <File/Folder>

Arguments:
  Specifies the file or directory path of the required OneDrive data

Options:
 -v, --verbose Enables verbose output
 -s, --silent  No additional output including errors
 -h, --help   Print help



CRC32


CRC32 is a command-line tool to store integrity information and validate
archived data, such as that stored on CD/DVD.  Validate your data prior
to archival and store the resulting crc32.txt with it so integrity can
be confirmed at a later date.  Checksums are generated at the file level
and each folder level.  A master checksum is also generated so you can
quicky assure your data is complete.

Usage: crc32.exe [-s] [-i] <folder>

    -s recurse subdirectories
    -i ignore CRC32.TXT files
    -v verbose directory info
    -vv verbose dir/file info

Note: Verbose args should only be used with redirection!

Examples: -

Create integrity data within a folder before writing to CD/DVD.

        crc -s -i -vv c:\mydata >c:\mydata\crc32.txt

Create a comparison file to confirm data on CD is valid.

        crc -s -i -vv d:\ >c:\temp\output.txt

These files can then be compared with a diff tool such as WinMerge to confirm data validity.

        winmerge.exe d:\crc32.txt c:\temp\output.txt



FWBlock


FWBlock is a command-line tool for blocking all executables in a given path.  This is useful for blocking untrusted software or programs you do not want to communicate via the network.  For example, to block unwanted automatic updates.

Usage: fwblock [OPTIONS] <File/Folder>
 
Arguments:
  Specifies the file or directory path

Options:
 -b, --block  Block EXEs in path (default)
 -d, --disable Disable but do not remove rules for EXEs in path
 -e, --enable  Enable disabled rules for EXEs in path
 -r, --remove  Remove existing rules for EXEs in path
 -h, --help   Print help



HashCalc


HashCalc is a command-line file hash calculator using common algorithms.  This tool currently supports the following hashing algorithms: -

  • MD5 - Legacy algorithm (for compatibility purposes)
  • SHA1 - Legacy algorithm (for compatibility purposes)
  • SHA2 - (sha224, sha256, sha384, sha512)
  • SHA3 - (sha3-224, sha3-256, sha3-384, sha3-512)
  • BLAKE2 - (blake2b 512, blake2s 256)

Usage: hashcalc.exe [OPTIONS] <File/Folder>

Arguments:
  Path to file or directory to hash

Options:
 -a, --algorithm  Hash algorithm to use [default: sha256] [possible values: md5, sha1, sha224, sha256, sha384, sha512, sha3-224, sha3-256, sha3-384, sha3-512, blake2b, blake2s]
 -r, --recursive   Process directories recursively
 -q, --quiet         Only output hash values
 -h, --help          Print help
 -V, --version     Print version



SyslgCmd


SyslgCmd is a command-line syslog client for Windows.  It can be used in conjunction with redirection for local logging and to suppress output.

E.G. To add the tag for my program "MyProgram" with a priority of "148" (local2.warning) whilst suppressing console output and logging the message to a local file: -

         syslogcmd.exe -s -t MyProgram -p 148 This is a message from my program > nul 2>> myprogram.log


Priorities
Combine facility with severity with a "." E.G. "user.notice". You can also use the relevant numeric code.
  
Facility can be one of: -
         kern
         user
         mail
         daemon
         auth
         syslog
         lpr
         news
         uucp
         cron
         authpriv
         ftp
         local0
         local1
         local2
         local3
         local4
         local5
         local6
         local7

Severity can be one of: -         emerg
         alert
         crit
         err
         warning
         notice
         info
         debug


Usage: syslgcmd [OPTIONS] <message>...

Arguments:
 <message>...   Message to send to the syslog server

Options: 
-s        Log the message to both standard error and the server
 -p       Set message priority (e.g. local3.info or 158) [default: local3.info]
 -t         Add a tag to the start of the message [default: ]
 -l         Log to the specified server (IP address or hostname) [default: localhost]
 -u        Write to a specified UDP socket [default: 514]
 -h, --help    Print help
 -V, --version  Print version



Sleep


Sleep is a simple interactive power management utility with countdown timer.

Use -A if your terminal doesn't fully support unicode characters.
Use -f to flush Windows system cache before performing the power action.
Use -t 0 to perform the power action immediately (and flush if specified).

Usage: sleep.exe <--time> <--action> [OPTIONS]

Options:
 -t, --time    Time specification: either minutes (e.g., '30', '0' for immediate) or target time (e.g., '14:30', '2:30 PM')
 -a, --action  Power action to execute [hibernate, sleep, shutdown, restart, logoff, lock]
 -A, --ascii      Use ASCII characters only (no Unicode/emojis)
 -f, --flush      Flush all file system buffers to disk before executing action (Admin required)
 -h, --help       Print help



Volumes


Volumes is utility that shows the info of any mounted drives.

USAGE:  volume [OPTIONS]

OPTIONS:
  -v, --verbose    Display detailed information for each drive
  --no-color, -nc   Disable colored output
  -?, -h, --help    Show this help message

DESCRIPTION:
  Displays information about all connected drives on the system.
  By default, shows a color coded compact table with drive letter, volume label,
  drive type, file system, and volume serial number.

COLOR CODING:
  ■ GREEN - Fixed drives (hard disks)
  ■ BLUE - Removable drives (USB, SD cards)
  ■ WHITE - CD-ROM/DVD drives
  ■ GOLD - Network drives
  ■ LIGHT BLUE - RAM disks
  ■ RED - Unknown/Error/Not Ready

EXAMPLES:
  Volumes        # Show compact table with colors
  Volumes -v       # Show detailed information
  Volumes --no-color   # Show compact table without colors
  Volumes -v --no-color # Show detailed info without colors



ClipFile


ClipFile is a command-line utility to copy the specified files to the Windows clipboard.

Usage: clipfile.exe <file1> [file2] [file3] ...

Arguments:
  File(s) to copy to the clipboard.



Paste


Paste is a command-line utility that writes any files contained in the windows clipboard to the current directory.

Usage: paste.exe

Arguments:
  None.

If no files are in the clipboard an error will be displayed: -
    Checking Windows clipboard for files...
    No files found in clipboard. Make sure you've copied files (not just text) to the clipboard.



Additional Information

Software usage

Our 'free software' is free to use and distribute without restrictions for both private and commercial use, providing they are not modified in any way. Our software is typically only available in x64 format and is only supported on Microsoft supported editions of Windows/Windows Server.

Our paid software is licensed to users under specific terms and conditions that outline its permitted use. By purchasing a license, you gain the right to install and use the software in accordance with its licensing agreement. Unauthorized distribution, modification, or use beyond the terms of the license is strictly prohibited. The license may include limitations on the number of devices, users, or instances in which the software can be deployed. For full details on the licensing terms, we recommend reviewing the official agreement provided with the software purchase. If you have any questions or need clarification, please contact us via our support form.

AV False Positives

All of our software is digitally signed for integrity and assurance and completely free from viruses, malware, or any malicious code. However, some antivirus programs may flag certain files or applications as potential threats due to heuristic analysis, outdated virus definitions, or overly aggressive security scanning.  We may also use license protection software in our paid products which increases the potential of false positives.  If you are unsure of any security alerts you receive regarding our software, please submit it to your anti-virus vendor for further analysis to confirm it contains no threats, or contact us via our support form so we may contact them on your behalf.

Statement of liability

Our software is provided as-is, without any warranties or guarantees of any kind. By using our software, you acknowledge that we are not liable for any damages, losses, or issues that may arise from its use. While we strive to ensure reliability, integrity and security, we cannot guarantee that the software will be error-free or function without interruption. Users assume all risks associated with downloading, installing, and using our software.