Last updated 4 months ago
Was this helpful?
Check for credential leaks
Detect vulnerable Custom Actions
Check MSI files signature (useful for MST Backdoor)
Check if Custom Actions can be overwritten