mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
5.1 KiB
5.1 KiB
CVE-2017-0145
Description
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.
POC
Reference
- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html
- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html
- https://www.exploit-db.com/exploits/41891/
- https://www.exploit-db.com/exploits/41987/
Github
- https://github.com/0xAbbarhSF/Termux-Nation-2022-Alpha
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/BrendanT2248/Week-16-Homework-Penetration-Testing-1
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections
- https://github.com/CodeWithSurya/-awesome-termux-hacking
- https://github.com/Cyberwatch/cyberwatch_api_powershell
- https://github.com/ErdemOzgen/ActiveDirectoryAttacks
- https://github.com/GhostTroops/TOP
- https://github.com/GhostTroops/scan4all
- https://github.com/GoDsUnReAL/fun
- https://github.com/Guccifer808/doublepulsar-scanner-golang
- https://github.com/Itz-Ayanokoji/All-in-one-termux-tools
- https://github.com/JERRY123S/all-poc
- https://github.com/JeffEmrys/termux-
- https://github.com/Kiz619ao630/StepwisePolicy3
- https://github.com/Lynk4/Windows-Server-2008-VAPT
- https://github.com/MelonSmasher/chef_tissues
- https://github.com/Monsterlallu/Agori-Baba
- https://github.com/Monsterlallu/Cyber-Kunjaali
- https://github.com/Monsterlallu/Top-500-hacking-tools
- https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/QWERTSKIHACK/awesome-termux-hacking
- https://github.com/R-Vision/ms17-010
- https://github.com/R0B1NL1N/AD-Attack-Defense
- https://github.com/Ratlesv/Scan4all
- https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API
- https://github.com/Totes5706/TotesHTB
- https://github.com/UNO-Babb/CYBR1100
- https://github.com/Whiteh4tWolf/Attack-Defense
- https://github.com/Zeyad-Azima/Remedy4me
- https://github.com/ZyberPatrol/Active-Directory
- https://github.com/androidkey/MS17-011
- https://github.com/aymankhder/AD-attack-defense
- https://github.com/bhataasim1/AD-Attack-Defence
- https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode
- https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode
- https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag-
- https://github.com/chaao195/EBEKv2.0
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/ericjiang97/SecScripts
- https://github.com/geeksniper/active-directory-pentest
- https://github.com/ginapalomo/ScanAll
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-
- https://github.com/himera25/termux-hacking
- https://github.com/hktalent/TOP
- https://github.com/hktalent/scan4all
- https://github.com/infosecn1nja/AD-Attack-Defense
- https://github.com/jbmihoub/all-poc
- https://github.com/k8gege/PowerLadon
- https://github.com/kdcloverkid/https-github.com-kdcloverkid-awesome-termux-hacking
- https://github.com/lnick2023/nicenice
- https://github.com/may215/awesome-termux-hacking
- https://github.com/merlinepedra/SCAN4LL
- https://github.com/merlinepedra25/SCAN4ALL-1
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
- https://github.com/nadeemali79/AD-Attack-Defense
- https://github.com/nirsarkar/scan4all
- https://github.com/paramint/AD-Attack-Defense
- https://github.com/peterpt/eternal_scanner
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/retr0-13/AD-Attack-Defense
- https://github.com/shubhamg0sai/All_top_500_hacking_tool
- https://github.com/skhjacksonheights/bestTermuxTools_skh
- https://github.com/sunzu94/AD-Attack-Defense
- https://github.com/sworatz/toolx500
- https://github.com/tataev/Security
- https://github.com/trhacknon/scan4all
- https://github.com/uroboros-security/SMB-CVE
- https://github.com/w3security/goscan
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/yzk0b/TERMUX-RD