Skip to content

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

Notifications You must be signed in to change notification settings

saran-gintoki/Windows-Exploit-Suggester

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Windows Exploit Suggester

Overview

Windows Exploit Suggester is a tool that analyzes a target's patch levels against the official Microsoft vulnerability database to detect missing patches. It also alerts users about available public exploits and Metasploit modules for the missing security bulletins.

This is an enhanced version of the original AonCyberLabs/Windows-Exploit-Suggester with modernized functionality and improved performance.

Key Improvements

  • Replaced xlrd with openpyxl: Supports modern .xlsx file formats.
  • Switched to requests for HTTP downloads: More reliable than urllib.
  • Improved error handling and logging: Provides clearer messages with alert levels.
  • Fixed CSV parsing issues: Prevents IndexError crashes.
  • Enhanced performance: Uses list comprehensions and optimized data handling.
  • More readable and maintainable: Simplified function logic for better usability.

This updated script runs seamlessly on Python 3.8+ and can efficiently download and analyze the latest Windows security bulletins.

Installation & Usage

1️⃣ Download the Python Script

Clone the repository or download the script manually.

2️⃣ Download the Microsoft Security Bulletin Database

To fetch the latest Microsoft vulnerability database, run:

python3 windows-exploit-suggester.py --update

3️⃣ Run the Tool Against System Information

Execute the script with a system information file:

python3 windows-exploit-suggester.py --database 2025-02-19-mssb.xlsx --systeminfo host-systeminfo-output.txt

About

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages