Advertisement
Tux_528

Leftovers Hunter Changelog

Oct 14th, 2023 (edited)
86
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.29 KB | Software | 0 0
  1. Version 0.6 (2023-12-07)
  2. ------------------------
  3.  
  4. Feature Additions:
  5. ------------------
  6. + Added detections for games installed from the Epic Games launcher and the Hyper-V system component to prevent more false positives (many thanks to Bonnet for his generous help and Graham Sutherland for his very useful article on his blog codeinsecurity).
  7. + Added internal documentation to the list of the names of the leftovers found for a better user experience.
  8. + Added many information messages during the initialization process of the script.
  9. + Added a configuration file to set and modify the script settings easily.
  10. + Added support for item names containing a software name and a ".exe" extension or a description delimited by the " - " string (thanks to spel and STY1001 for their tests).
  11. + Added detection for registry keys containing a unique identifier in their name (thanks to f/barou for his tests).
  12.  
  13.  
  14. Improvements:
  15. -------------
  16.  
  17. Improvements to the Search Algorithms
  18. -------------------------------------
  19. * Improved the string search algorithm to make it more restrictive and prevent rough false positives and false negatives.
  20. * Improved the relevance of the search algorithms for sub-item names (many thanks to Weiss and spel for their trigger tests).
  21. * Strengthened the search algorithms to detect and extract a software name preceded by a company name to prevent more false negatives (many thanks to Lannes and Powerbloom for their trigger tests).
  22. * Complete improvement of the detection algorithm of the residual folders in the "Users" system folder (many thanks to Mithrandir and f/barou for their tests).
  23. * Improved the search algorithms to retrieve the status of the local administrator account integrated into the system and detect its corresponding folder as a leftover if it is disabled.
  24. * Optimized the search algorithms with the addition of an algorithm to remove underscores from the item names and speed up their detection (thanks to Weiss and N530 for their trigger tests).
  25. * Improved detection of software names containing version numbers thanks to more accurate and complete regular expressions (many thanks to Mithrandir, William, and spel for their valuable tests).
  26. * Improved the handling of software names containing generic strings that caused false negatives after extraction (thanks to STY1001 and Lannes for their tests).
  27. * Refined the spacing algorithm to support very short software names and thus prevent more false positives (thanks to Plunder and Mithrandir for their tests).
  28. * Improved the flexibility, accuracy, and efficiency of the extraction and search algorithms for folders containing package names (many thanks to Plunder and Bros for their tests).
  29.  
  30. Improvements to the Security Algorithms
  31. ---------------------------------------
  32. * Improved filtering algorithms thanks to the addition of some fifteen strings to exclude and blacklist from the search for leftovers to prevent more false positives and false negatives (many thanks to Powerbloom, Plunder, N530, STY1001, and spel for their valuable tests).
  33. * Improved filtering algorithms thanks to the addition and refinement of some fifty strings to ignore from the search for leftovers to prevent more false negatives (many thanks to Powerbloom, Bros, Weiss, f/barou, !mrane, N530, spel, Lannes, and STY1001 for their valuable tests).
  34. * Improved filtering algorithms thanks to the addition and improvement of some fifteen custom rules to exclude items used by Visual Studio, Visual Studio Code, Android Studio, Epic and Steam games, Genshin Impact, Adobe After Effects, Internet Download Manager, software from IObit and DVDFab, Bleachbit, NVIDIA PhysX, and AURA Service (many thanks to Plunder, STY1001, spel, Bonnet, Powerbloom, and f/barou for their feedback and their valuable tests).
  35. * Strengthened security algorithms with the addition of an experimental system to filter out as far as possible items created by pieces of software usable without installation (many thanks to spel and Lannes for their valuable tests).
  36. * Strengthened security algorithms with the addition of an experimental system to detect software reinstalled manually by the user by scanning the names of Start menu shortcuts (many thanks to spel and Lannes for their trigger tests).
  37. * Strengthened security algorithms with the addition of an algorithm to retrieve the computer manufacturer's name and exclude all matching items from the search for leftovers.
  38.  
  39. User Experience Improvements
  40. ----------------------------
  41. * Improved the overall user experience to make the script easier to use and prevent confusion with the files used as resources and the files created by the script (many thanks to spel for his trigger tests).
  42. * Improved the clarity and the detail level of the displayed messages in the interface and the report.
  43. * Improved the confidentiality of the debug archive with the addition of a user name anonymization algorithm (many thanks to Powerbloom and N530 for their feedback).
  44. * Improved the compression process of the debug files by working on copies to preserve their original content and allow advanced users to examine specific items quickly on their configuration without being annoyed by the anonymization process (many thanks to N530 for his great suggestion).
  45. * Improved the PowerShell script for size calculation to display the size of residual folders in the most suitable unit (KB, MB, or GB) and support hidden or system files as well as empty reports.
  46. * Improved the accuracy and the detail level of the information written in the log.
  47. * Improved the syntax and the internal documentation of the custom rules.
  48.  
  49. Miscellaneous Improvements
  50. --------------------------
  51. * Complete refactoring of the main analysis functions to improve significantly the maintainability of the script.
  52. * Complete refactoring of the portions of code related to the management and writing of the log.
  53. * Improved maintenance and debugging of the script with the addition of an automated test algorithm (many thanks to spel for his awesome suggestion).
  54. * Many miscellaneous improvements of the search and security algorithms to prevent rough false positives and false negatives (many thanks to Powerbloom, Plunder, !mrane, and STY1001 for their valuable tests).
  55. * Many miscellaneous improvements made to the code, the user experience, the displayed messages in the interface, and the interface layout.
  56.  
  57.  
  58. Bug Fixes:
  59. ----------
  60. * Fixed a stupid bug that prevented the names of residual registry keys from being written to the list of the names of the leftovers.
  61. * Fixed a stupid bug that prevented an item name specified in a custom rule from being globally excluded from the search for leftovers.
  62. * Fixed a major bug that prevented the exclusion of several item paths in the custom rules due to a misinterpretation of double quotes in CMD (many thanks to Mithrandir for his valuable tests).
  63. * Fixed a detection problem that caused false positives for the sub-item names beginning with a digit (many thanks to spel for his advanced tests).
  64. * Fixed an encoding problem that prevented the PowerShell from correctly writing accented letters in the log and the list of the names of the leftovers (thanks to Lannes for his tests).
  65.  
  66.  
  67. Removals:
  68. ---------
  69. - Removed superfluous analysis and extraction algorithms.
  70. - Removed around fifty unnecessary strings from the list of ignored strings (many thanks to Bros for his trigger tests).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement