Iris WinDbg extension performs basic detection of common Windows exploit mitigations (32 and 64 bits).
The checks implemented, as can be seen in the screenshot above, are (for the loaded modules):
If you don't know the meaning of some of the keywords above use google, you'll find better explanations than the ones I could give you. Setup To "install", copy iris.dll into the winext folder for WinDbg (for x86 and x64).
WinDbg 10.0.xxxxx Unless you installed the debug tools in a non standard path you'll find the winext folder at:
IRIS WinDbg Extension (firstname.lastname@example.org). Available commands: help = Shows this help modules = Display exploit mitigations for all loaded modules.
Running As shown in the screenshot above, just run: !iris.modules or simply !modules.
Warning Don't trust blindly on the results, some might not be accurate. I pretty much used as reference PE-bear parser, winchecksec, Process Hacker, and narly. Thank you to all of them. I put this together in a day to save some time during a specific assignment. It worked for me but it hasn't been thoroughly tested. You have been warned, use at your own risk. I'll be updating and maintining this, so any issues you may find please let me know. I plan to add a few more mitigations later.
References Besides the references mentioned before, if you want to write your own extension (or contribute to this one) the Advanced Windows Debugging book and the WinDbg SDK are your friends.