Last updated 8 months ago
Check for credential leaks
Detect vulnerable Custom Actions
Check MSI files signature (useful for MST Backdoor)
Check if Custom Actions can be overwritten