This plugin does an in-memory scanning of process loaded modules checking if they were compiled with /SafeSEH, if so it can list the registered handlers (you can follow them at CPU window doing double click).
This plugin is useful when exploiting vulnerabilities in systems with Software DEP protection.
The plugin lists all loaded modules and can give you the following results for each one:
/SafeSEH Off : No /SafeSEH, jump party ;-)
/SafeSEH ON : /SafeSEH active, you can list registered handles
using rigth click.
No SEH : SEH is not active for this module, take a look
at PE/COFF specs (IMAGE_DLLCHARACTERISTICS_ NO_SEH)
Error : There was an error reading module structure :-(