zzz_exploit

MS17-010 zzz_exploit.py modified to allow for reverse shells - jdiazmx/MS17-010_WORAWIT. ,MS17-010 zzz_exploit.py modifi...

zzz_exploit

MS17-010 zzz_exploit.py modified to allow for reverse shells - jdiazmx/MS17-010_WORAWIT. ,MS17-010 zzz_exploit.py modifications. All credit goes to Worawit: https://github.com/worawit/MS17-010/. This is my personal enhancement to zzz_exploit.py.

相關軟體 Autoruns for Windows 資訊

Autoruns for Windows
此實用程序具有關於任何啟動監視器的自動啟動位置最全面的知識,可顯示在系統啟動或登錄期間將配置哪些程序配置為運行,並按照 Windows 處理它們的順序顯示條目。這些程序包括啟動文件夾中的 Run,RunOnce 和其他註冊表項。您可以配置 Autoruns for Windows 以顯示其他位置,包括資源管理器外殼擴展,工具欄,瀏覽器幫助程序對象,Winlogon 通知,自動啟動服務等等。 Aut... Autoruns for Windows 軟體介紹

zzz_exploit 相關參考資料
F1uYu4nMS17-010_WORAWIT: MS17-010 ... - GitHub

MS17-010 zzz_exploit.py modified to allow for reverse shells - F1uYu4n/MS17-010_WORAWIT.

https://github.com

jdiazmxMS17-010_WORAWIT: MS17-010 ... - GitHub

MS17-010 zzz_exploit.py modified to allow for reverse shells - jdiazmx/MS17-010_WORAWIT.

https://github.com

jymcheongMS17-010_WORAWIT: MS17-010 zzz_exploit.py ...

MS17-010 zzz_exploit.py modifications. All credit goes to Worawit: https://github.com/worawit/MS17-010/. This is my personal enhancement to zzz_exploit.py.

https://github.com

mez-0MS17-010-Python - GitHub

usage: zzz_exploit.py [-h] [-u] [-p] -t -c [-P] [--version] Tested versions: 1 Windows 2016 x64 2 Windows 10 Pro Vuild 10240 x64 3 Windows 2012 R2 x64 4 ...

https://github.com

Modified zzz_exploit.py script which will execute a user ...

Modified zzz_exploit.py script which will execute a user provided shellcode file (e.g. generated via msfvenom) to be dropped and executed on the target.

https://gist.github.com

th3gundyMS17-010_WORAWIT: MS17-010 zzz_exploit.py ... - GitHub

This repository · Sign in Sign up · Code Pull requests 0 Projects 0 Actions Security 0 Pulse. MS17-010 zzz_exploit.py modified to allow for reverse shells. Star 0.

https://github.com

zzz_exploit.py - GitHub

沒有這個頁面的資訊。瞭解原因

https://github.com

[EXP]windows全版本SMB溢出工具加强版- K8哥哥- 博客园

如exe启动参数为 m.exe -Start 实战命令为zzz_exploit.exe 192.11.22.82 -Start. 内网批量. 可结合cping批量溢出内网,将名称改为smbcheck即可, ...

https://www.cnblogs.com

永恒之蓝MS17-010批量自动化渗透姿势| 默小文

zzz_exploit.py 会在C盘根目录创建 pwded.txt 文件,修改它来执行你的Payload. 1 2 3 4 5 6

http://lfoder.github.io