Last updated 1 month ago
Check for credential leaks
Detect vulnerable Custom Actions
Check MSI files signature (useful for MST Backdoor)
Check if Custom Actions can be overwritten