MSI Files
Analyse MSI files for vulnerabilities
Check for credential leaks
Detect vulnerable Custom Actions
Check MSI files signature (useful for MST Backdoor)
Check if Custom Actions can be overwritten
Last updated