All Projects → jflyup → goMS17-010

jflyup / goMS17-010

Licence: other
Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)

Programming Languages

python
139335 projects - #7 most used programming language
go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to goMS17-010

MalwareDatabase
One of the few malware collection
Stars: ✭ 37 (-44.78%)
Mutual labels:  exploit, ransomware
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (+467.16%)
Mutual labels:  ransomware, wannacry
Cryptolocker
CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (+17.91%)
Mutual labels:  exploit, ransomware
CamRaptor
CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (+58.21%)
Mutual labels:  exploit
doona
Network based protocol fuzzer
Stars: ✭ 64 (-4.48%)
Mutual labels:  exploit
ronin-exploits
A Ruby micro-framework for writing and running exploits
Stars: ✭ 36 (-46.27%)
Mutual labels:  exploit
discord-bugs-exploits
A Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-67.16%)
Mutual labels:  exploit
exploit
My exploitDB.
Stars: ✭ 16 (-76.12%)
Mutual labels:  exploit
Cloak-And-Dagger
An overlay attack example
Stars: ✭ 22 (-67.16%)
Mutual labels:  exploit
Rage
Rage allows you to execute any file in a Microsoft Office document.
Stars: ✭ 68 (+1.49%)
Mutual labels:  exploit
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+1034.33%)
Mutual labels:  exploit
Phirautee
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+43.28%)
Mutual labels:  ransomware
Umbraco-RCE
Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-8.96%)
Mutual labels:  exploit
HEVD Kernel Exploit
Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.
Stars: ✭ 44 (-34.33%)
Mutual labels:  exploit
x64dbgpylib
Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (-31.34%)
Mutual labels:  exploit
SpringBootExploit
项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
Stars: ✭ 1,060 (+1482.09%)
Mutual labels:  exploit
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-71.64%)
Mutual labels:  exploit
WindowsElevation
Windows Elevation(持续更新)
Stars: ✭ 443 (+561.19%)
Mutual labels:  ms17-010
Ransomware-Reports
This repo is a collection of Ransomware reports from vendors, researchers, etc.
Stars: ✭ 90 (+34.33%)
Mutual labels:  ransomware
petya key
A decoder for Petya victim keys, using the Janus' masterkey.
Stars: ✭ 35 (-47.76%)
Mutual labels:  ransomware

goMS17-010

goMS17-010 detects if host(s) is vulnerable to SMB exploit(MS17-010), which is used by NSA hacking tools leaked by Shadow Brokers. If it's vulnerable, then checks if the target machine is running the Double Pulsar SMB backdoor. Inspired by this Metasploit module, but doesn't depend on MSF or any framework, just run ms17-010.go or ms17-010.py with option(s). Go version is preferred as it's very fast (credit goroutine for that! ) when scanning a network. The release is built from go code.
-i, detect single host
-n, scan a whole network in CIDR Notation, for example, 192.168.1.1/24
-h, show help

Here is an Android app to check this too. Enable WannaCry Scan toggle in the Settings, the app would scan your network, if any machine is vulnerable, a red warning icon will show.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].