___ __ ______ ________ _____ ______________ ______ __ | / /___ ____ /______ ___ __ \_________(_)__ ______________ __ ____/__ /_______________ /__ __ | / /_ / / /_ /__ __ \ __ / / /_ ___/_ /__ | / / _ \_ ___/ _ / __ __ \ _ \ ___/_ //_/ __ |/ / / /_/ /_ / _ / / / _ /_/ /_ / _ / __ |/ // __/ / / /___ _ / / / __/ /__ _ ,< _____/ \__,_/ /_/ /_/ /_/ /_____/ /_/ /_/ _____/ \___//_/ \____/ /_/ /_/\___/\___/ /_/|_| ------------------------------------------------------------------------------------------------------------- {GitHub:https://github.com/RogueCyberSecurityChannel}
- Web scrape https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules for known vulnerable drivers & their SHA 256 hashes
- Query lol drivers API https://www.loldrivers.io/api/drivers.json for known vulnerable drivers & their SHA 256 hashes
- Query host drivers
- SHA 256 hash all local system drivers!
- Look for matches
- Suggest commands to delete any vulnerable drivers
git clone
git clone https://github.com/RogueCyberSecurityChannel/Vulnerable-Driver-Scanner