This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
Hi, I don't get why you hit this line:
./windows-exploit-suggester.py --database <database> --ostext 'windows server 2008 r2'
and in the output, vulnerabilities like 'MS16-032' don't show up, ms16_014 neither and it works too Regards