AonCyberLabs / Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
GNU General Public License v3.0
3.94k stars 1.02k forks source link

Fixed issue#34 OS name parsing for Server 2016 #41

Open evets007 opened 4 years ago

evets007 commented 4 years ago

The osnamearray defined in getname() needs an update for server 2016

def getname(ostext):

if ostext == False: return False

osname=False

osnamearray=[["xp","XP"], ["2000","2000"], ["2003","2003"], ["vista","Vista"], ["2008","2008"], [" 7","7"], [" 8","8"], ["2012","2012"], ["2016","2016"], <== Added ["8.1","8.1"], [" 10","10"]]

h3r0cybersec commented 4 years ago

@evets007 I belive this repo is abbandoned. If you want to contribute please feel free to submit your code here https://github.com/luigi-cavallo/Windows-Exploit-Suggester