AonCyberLabs / Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
GNU General Public License v3.0
3.94k stars 1.02k forks source link

Issue#34 Fix parsing OS name for Windows Server 2016 #40

Closed evets007 closed 4 years ago

evets007 commented 4 years ago

The osnamearray defined in getname() needs an update for server 2016

def getname(ostext):

  if ostext == False:
    return False

  osname=False

  osnamearray=[["xp","XP"],
               ["2000","2000"],
               ["2003","2003"],
               ["vista","Vista"],
               ["2008","2008"],
               [" 7","7"],
               [" 8","8"],
               ["2012","2012"],
               ["2016","2016"],       <== Add
               ["8.1","8.1"],
               [" 10","10"]]