1. IT-Security >
  2. Cyber Security Nachrichten >
  3. DetExploit - Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

DetExploit - Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User

RSS Kategorie Pfeil IT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink öffnen


DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user.
As we know, most of cyberattacks uses vulnerability that is released out year before.
I thought this is huge problem, and this kind of technology should be more powerful than technology that will detect unknown malwares or exploits.
Also this project is my theme of Mitou Jr project in Japan.
I wish and work hard to make this an huge OSS (Open Source Software) project, to help these days society.

Demo
  • Demo Video Clip (v0.5, English, Click and jump to YouTube to play video)

Requirements

How to run
Executable Build is not available now.
It is planned to be availble on stable release.
# Install requirements
C:\path\to\DetExlopit>pip install -r requirements.txt
# Move to src directory
C:\path\to\DetExlopit>cd src
# Run CUI version using python (PATH needs to be configured if not.)
C:\path\to\DetExlopit\src>python main.py
# Run GUI version using python (PATH needs to be configured if not.)
C:\path\to\DetExploit\src>python gui.py

Supported Database

Contact to developer


...

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu DetExploit - Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User






Ähnliche Beiträge

  • 1. DetExploit - Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User vom 253.32 Punkte ic_school_black_18dp
    DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user.As we know, most of cyberattacks uses vulnerability that is released out year before.I thought this is huge problem,
  • 2. TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors vom 221.41 Punkte ic_school_black_18dp
    Original release date: March 15, 2018Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bur
  • 3. Azure.Source – Volume 61 vom 196.11 Punkte ic_school_black_18dp
    Microsoft Connect(); 2018 On Tuesday, December 4th, Microsoft Connect(); 2018 provided a full day of developer-focused content—including updates on Azure and Visual Studio, keynotes, demos, and real-time coding with experts. Scott Guthrie’s keyno
  • 4. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 5. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 6. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 7. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 8. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 9. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 10. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 11. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 12. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 192.45 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a