windows-kernel-exploits
exploit-CVE-2017-7494
windows-kernel-exploits | exploit-CVE-2017-7494 | |
---|---|---|
7 | 1 | |
7,712 | 367 | |
0.0% | - | |
0.0 | 0.0 | |
almost 3 years ago | over 1 year ago | |
C | C | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
windows-kernel-exploits
-
Ask HN: Do you use any software (mainly) developed in China?
This is a big one for me:
https://github.com/SecWiki/windows-kernel-exploits
Zoomeye, the chinese shodan is ok too.
- Windows Kernel Exploits
-
Offsec.tools – A vast collection of security tools
I tried ctrl+f couldn't find the two things I found invaluable. It really needs a search function especially for us mobile users without a nice mouse wheel.
Anyway, the two things I can vouch for are "windows exploit suggester" and this chinese repo: https://github.com/SecWiki/windows-kernel-exploits
Of course I assume Linpeas/Winpeas is there. You belong in an insane asylum if you left them out of any list like this.
- There’s a GitHub repo for testing every single Windows security / privilege mechanism. I’ve lost the book mark, anyone know it?
- Need help with Privilege Escalation
-
Just started lab a bit tough
https://github.com/SecWiki/windows-kernel-exploits Has helped me out and definitely suggest Linux exploit suggester and win and lin peas
exploit-CVE-2017-7494
-
Anybody know if old Samba on CentOS 6 is even vulnerable to EternalRed/sambacry/7494? It should be….
I’m trying to exploit samba version 3 on CentOS 6. I have tried CentOS 6.3 and 6.4, and I can’t get it to work. I’ve also tried different hypervisors (ESXi and KVM) and both the metasploit module and the opsxcq script here https://github.com/opsxcq/exploit-CVE-2017-7494 .
What are some alternatives?
CVE-2020-0796 - CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
esp-idf-smb-client - SMB client example for esp-idf
h-encore - Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
redis-rogue-server - Redis(<=5.0.5) RCE
HardeningKitty - HardeningKitty - Checks and hardens your Windows configuration
sqlite-gui - Lightweight SQLite editor for Windows
DDOS-RootSec - DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
WSAAcceptBackdoor - Winsock accept() Backdoor Implant.
Samba - https://gitlab.com/samba-team/samba is the Official GitLab mirror of https://git.samba.org/samba.git -- Merge requests should be made on GitLab (not on GitHub)
uuid-loader - UUID based Shellcode loader for your favorite C2
universal-otherapp - Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15