Open-source data by  PatchCurated.org  ·  A Senserva project
MISA member →
⚠ EARLY ACCESS We're just getting started — data, scanner, and docs are all actively being built. Bear with us.
FREE · WINDOWS · MAC · LINUX · NO AGENT · NO CLOUD

Find the gaps.
Cure It.
Move on.

Patch management got complicated — expensive tools, vendor lock-in, cloud dependencies. PatchCured makes it a verb again. Download, run as administrator, read the output. Missing patches, security misconfigurations, and suspicious events in one pass.

Download cured.exe → See What It Checks CLI Reference
Windows10 / 11 / Server
macOS12+ Monterey
LinuxUbuntu · Debian · RHEL
.NET 10Runtime required
AdminRequired to scan
Patches

Missing patch detection

File version probes, registry supplement, and MSI database detection across 25,000+ applications. Supersedence resolved automatically — direct KB-to-KB and composite file version chains.

Configuration

Security misconfiguration

12 registry-based checks — WDigest, LSA Protection, SMBv1, LLMNR, UAC, firewall, RDP NLA, auto-logon credentials, PowerShell v2, unquoted service paths, credential caching, guest account.

Events

Suspicious event detection

8 event log queries over the last 7 days — failed logons with source IPs, account lockouts, RDP sessions, admin group changes, audit log cleared, new services, new local accounts.

Quick Start

No config. No agent. Run it.

Three ways to scan. Pick the one that fits your workflow.

cured.exe
Scan this machine — run as administrator
cured

MISSING PATCHES (3)
CRITICAL KB5049981 — 2025-01 CU Windows 11
CRITICAL KB5034441 — .NET Framework 4.8.1
IMPORTANT Chrome-132 — Google Chrome

SECURITY CONFIG (2 findings)
CRITICAL SEC-003 LSA Protection disabled
IMPORTANT SEC-005 SMBv1 enabled

SECURITY EVENTS (7 days)
IMPORTANT EVT-001 47 failed logon attempts

Sync fresh data then scan
cured --refresh

Scan a remote machine
cured remote 192.168.1.50

Export for AI — no API key needed
cured --export-ai scan.md
Option 1 — Pre-built database

Download cured.exe and patches.db from the repo. Point the scanner at the database. No build step, no sync required. Ideal for getting started immediately.

Option 2 — Sync before scanning

Run cured --refresh to pull the latest data from all 38 sources, then scan. One command. Always current. Requires internet on first run.

Option 3 — Air-gap

Sync once on an internet-connected machine, clone to a compact copy with superseded patches stripped, move the single .db file to USB. No internet at scan time. Use cured-local.exe — remote scanning code compiled out.

Security Configuration Checks

SEC-001 through SEC-012

Registry-based checks run on every scan. No agents, no WMI, no external calls.

CheckWhat It CatchesSeverity
SEC-001AutoAdminLogon with plaintext credentials stored in registryCritical
SEC-002WDigest enabled — plaintext passwords cached in LSASS memoryCritical
SEC-003LSA Protection (RunAsPPL) disabled — LSASS unprotectedCritical
SEC-004Windows Firewall disabled on any profile (domain, private, public)Important
SEC-005SMBv1 still enabled — exploited by WannaCry and most ransomwareImportant
SEC-006UAC disabled or set to never notifyImportant
SEC-007LLMNR enabled — susceptible to name poisoning / credential captureImportant
SEC-008Remote Desktop allowed without Network Level AuthenticationImportant
SEC-009PowerShell v2 available — bypasses constrained language mode and loggingModerate
SEC-010Unquoted service paths — local privilege escalation vectorModerate
SEC-011Excessive cached logon count — credential exposure risk offlineModerate
SEC-012Guest account enabledModerate
CLI Reference

All commands

Everything cured.exe can do. Most flags can be combined.

cured

Scan local machine. Missing patches, SEC-001–012 checks, and 7-day event log analysis. Run as administrator.

--severity--json--html--verbose
cured --refresh

Sync patch database from all 38 sources then scan immediately. One command to always scan with fresh data.

cured --export-ai <file>

Export scan results as an AI-ready markdown file with a prompt template. No API key required. Paste into any AI chat.

cured --ai-key <key>

Inline AI analysis — adds a prioritized plain-text remediation plan directly to the scan output.

env:VARfile:path
cured --json

Output results as JSON for scripting, SIEM ingestion, or piping into PowerShell with ConvertFrom-Json.

cured --list-apps

List all detected applications with versions and detection method. No patch check performed.

cured remote <host>

Scan a remote Windows machine over C$ admin shares. No agent, no WinRM, no WMI required.

--credentials
cured repo sync

Incremental patch database refresh. Only fetches what changed since last sync using ETags and date cursors.

--db <path>
PowerShell Module

Native objects. Pipe anywhere.

Wraps cured.exe --json and returns real PowerShell objects. Filter, sort, export to CSV, or feed into Intune detection scripts.

PowerShell
Import-Module Netchk25
$r = Invoke-Netchk25Scan

Filter critical missing patches
$r.missingPatches |
  Where-Object severity -eq 'Critical' |
  Format-Table kbArticleId, title

Security findings that are failing
$r.securityFindings |
  Where-Object finding -eq $true |
  Format-Table checkId, name, severity

Intune detection script — exit 1 if critical
$r = Invoke-Netchk25Scan -Severity Critical
if ($r.missingPatches.Count -gt 0) { exit 1 }

Export for AI — no API key
Export-Netchk25ForAi -Path scan.md
Invoke-Netchk25Scan

Scan local machine. Returns object with missingPatches, securityFindings, eventFindings, and summary.

Get-Netchk25Apps

All detected applications with versions, vendor, and detection method used.

Export-Netchk25ForAi

Scan and export as AI-ready .md or .csv. No API key needed. Paste into any AI chat.

Get-Netchk25Analysis

Scan plus inline AI analysis in one command. Requires Anthropic API key.

AI Analysis

Prioritized remediation.
No API key required.

PatchCured can analyze your scan results with AI two ways — free with no setup, or automated with an API key. Either way you get a plain-English remediation plan ranked by risk.

Download Free →
Free — no API key

Export and paste

Run cured --export-ai scan.md. The output file includes your full scan results plus a ready-to-use prompt. Paste into Claude.ai, ChatGPT, Copilot, or any AI chat. Works immediately, costs nothing.

Automated — API key

Inline analysis

Add --ai-key env:ANTHROPIC_KEY and the remediation plan appears directly in your scan output. Pipe into JSON, include in scripts, or run in CI. Key can come from an environment variable or a file.

Origin

25 years in the making.

Built by the creator of HFNetChk and MBSA. Free, agentless, command-line patch scanning — the way it was always meant to be.

"On the 25th anniversary of launching HFNetChk I'm back in patch management. The original was free, ran from a command line, and helped millions of administrators find missing patches with no agent and no vendor lock-in. That was the right idea then. It's still the right idea now."
Mark Shavlik Creator of HFNetChk (1999) and MBSA · Founder, Senserva
Built by Senserva

Microsoft security. 25 years of practice.

Senserva builds Microsoft 365 and Azure security products. PatchCured is built on PatchCurated.org — the open-source patch database maintained by the community. Senserva is a member of the Microsoft Intelligent Security Association (MISA), an invite-only program for ISVs building security solutions on Microsoft technology.

senserva.com → PatchCurated.org →
Data source

PatchCured scans against PatchCurated — an open SQLite database covering 25,000+ applications across 38 sources. Use the pre-built database, sync it yourself, or contribute new sources back to the community.

Get Started

Free. No account.
Run it in 60 seconds.

Download cured.exe, run as administrator, read the output. That's it.

Download Free → PatchCurated Data → GitHub