MSI Files

Analyse MSI files for vulnerabilities

  • Check for credential leaks

  • Detect vulnerable Custom Actions

  • Check MSI files signature (useful for MST Backdoor)

  • Check if Custom Actions can be overwritten

Last updated