Sherlock is a PowerShell script designed to quickly find missing software patches for local privilege escalation vulnerabilities, including a variety of known vulnerabilities such as MS10-015, MS10-092, MS13-053, MS13-081, MS14-058, MS15-051, MS15-078, MS16-016, MS16-032, MS16-034, MS16-135, and CVE-2017-7199. It provides basic usage instructions and can be imported and run within PowerShell.
FEATURES
SIMILAR TOOLS
A remediation operations platform that streamlines vulnerability management by connecting security findings to fixing teams through automated workflows.
A vulnerability and exposure management platform that unifies security tool data, automates workflows, and provides risk-based prioritization for enterprise vulnerability management programs.
Platform for users to test cybersecurity skills by exploiting vulnerabilities.
A collection of Ansible roles for hardening various systems and services
A tool for scanning Adobe Experience Manager instances for potential security vulnerabilities
An application security platform that aggregates, prioritizes and contextualizes vulnerabilities from multiple security scanners and sources to help manage application and cloud security risks.
A tool for scanning and identifying potential security risks in GitHub organizations, users, and repositories.
A collection of 132 exploits added to Packet Storm in April 2024
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.