2 Star 2 Fork 1

Mstir/Penetration_Testing_POC

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
克隆/下载
贡献代码
同步代码
取消
提示: 由于 Git 不支持空文件夾,创建文件夹后会生成空的 .keep 文件
Loading...
README

bluekeep

Public work for CVE-2019-0708

2019-11-17 Update

Added Windows 7 32bit exploit POC code.

Using the address within the POC exploit code I had ~80% success rate against my test VM. It could likely be modfied to increase.

Usage

Replace the buf variable with your shellcode. Update the host variable to your target.

python3 win7_32_poc.py

Requirements

  • Python3

Legal Disclaimer

This project is made for educational and ethical testing purposes only. Usage of for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

author: https://github.com/0xeb-bp/bluekeep

马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
1
https://gitee.com/mstir/Penetration_Testing_POC.git
git@gitee.com:mstir/Penetration_Testing_POC.git
mstir
Penetration_Testing_POC
Penetration_Testing_POC
master

搜索帮助