The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html
- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html
- https://www.exploit-db.com/exploits/41891/
- https://www.exploit-db.com/exploits/41987/
- https://www.exploit-db.com/exploits/42030/
- https://www.exploit-db.com/exploits/42031/
- https://github.com/0xAbbarhSF/Termux-Nation-2022-Alpha
- https://github.com/0xBV/Vulnerability-Management
- https://github.com/0xabdoulaye/CTFs-Journey
- https://github.com/0xsyr0/OSCP
- https://github.com/1999matrix/vulnerability-scanner
- https://github.com/61106960/adPEAS
- https://github.com/90l3m0np13/Eternal
- https://github.com/A1irzayevv/akm-python_final_project
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Abhishek9911-bit/Internship-Task-3-Elevate-Labs
- https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint
- https://github.com/Ahmadam37/Vulnerability-Analysis
- https://github.com/Alan-coder-eng/vulnerability-pocs-collection
- https://github.com/AlexielArdilla/El-libro-completo-del-Hacker
- https://github.com/Ali-Imangholi/EternalBlueTrojan
- https://github.com/Ansuman2004/Basic_Vulnerability_Scan
- https://github.com/AntiDajjal/S012
- https://github.com/AnugiArrawwala/CVE-Research
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/AtithKhawas/autoblue
- https://github.com/BHAVYA-dendi/cybersecurityintern
- https://github.com/BILLYZAS/Portfolio
- https://github.com/BengaminButton/XILLEN-Vulnerability-Scanner
- https://github.com/BerkutSolutions/berkut-cyber-base
- https://github.com/Bharathkasyap/programmatic-vulnerability-remediations-Bharath
- https://github.com/Bhavya-2508/cybersec-task-03-vuln-scan
- https://github.com/BusyDetective/ElevateLabs_3
- https://github.com/ByteX7/RansomGuard
- https://github.com/CPester05/Exploits
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CharanKairoju/Cybersecurity_Intership
- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections
- https://github.com/CodeWithSurya/-awesome-termux-hacking
- https://github.com/CodingChatRoom/Advance-Reconnaissance-
- https://github.com/CodingChatRoom/metasploit-cheatsheet-saqlain
- https://github.com/CrossCodeXm/El-libro-completo-del-Hacker
- https://github.com/Cruxer8Mech/Idk
- https://github.com/CyberClarity/Vulnerability-scan-task
- https://github.com/Cyberwatch/cyberwatch_api_powershell
- https://github.com/Cybug-404/Task_3
- https://github.com/DParijat07/Vulnerability-Assessment-Simulation
- https://github.com/DamnYatin/All-in-one-termux-tools
- https://github.com/Dareh123/Jubilant
- https://github.com/David-Ogrande/CVEs-NVD
- https://github.com/Dendipriyankareddy/cybersecurityinternship
- https://github.com/DenuwanJayasekara/CVE-Exploitation-Reports
- https://github.com/Devil-Gulshan/cybersecurity-intern-tasks-
- https://github.com/Divi-R0706/basic_vulnerable_scan
- https://github.com/Drevon-Shaw/Basic-Pentesting-Lab
- https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution
- https://github.com/EagleCyber-74/500-tools
- https://github.com/EmanuelEdi/ETERNAL-BLUE
- https://github.com/EnriqueSanchezdelVillar/NotesHck
- https://github.com/ErdemOzgen/ActiveDirectoryAttacks
- https://github.com/FATEHALI-ABBASALI/Cybersecurity-Task3-OpenVas-Scan
- https://github.com/FaithOnosoneTech/Penetration-Testing-Project
- https://github.com/Faizan-Khanx/CEH-Preparation
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/Frat1n/Escalibur_Framework
- https://github.com/FutureComputing4AI/ClarAVy
- https://github.com/GSayali-D/Internship-task-report
- https://github.com/GenisMil/MetasploitAvanzado1--meterpreter
- https://github.com/Ghebriou/platform_pfe
- https://github.com/GhostTroops/TOP
- https://github.com/GhostTroops/scan4all
- https://github.com/GoDsUnReAL/fun
- https://github.com/Guccifer808/doublepulsar-scanner-golang
- https://github.com/HarshRajSinghania/smbvulnrecon
- https://github.com/IagoRamosH/Security-EternalBlue-Bluekeep
- https://github.com/IndulgeinDotNet/UtilityMaestro
- https://github.com/Itz-Ayanokoji/All-in-one-termux-tools
- https://github.com/JERRY123S/all-poc
- https://github.com/JMG15111998/Common-Vulnerabilities-and-Exposures-CVEs-
- https://github.com/JeffEmrys/termux-
- https://github.com/Jeremias215/VulnerabilityManagement
- https://github.com/Jimi421/NakulaScan-2.0
- https://github.com/Jordann04/TwinJordan
- https://github.com/K1ngDamien/epss-super-sorter
- https://github.com/Kiz619ao630/StepwisePolicy3
- https://github.com/Kuromesi/Py4CSKG
- https://github.com/LT7T/SecMCP
- https://github.com/LinuxUser255/Python_Penetration_Testing
- https://github.com/Lynk4/Windows-Server-2008-VAPT
- https://github.com/ManojPatil99/WannaCry-Ransomware-Malware-Analysis
- https://github.com/Manrajprojects/Comptia-security-cheetsheet
- https://github.com/MarikalAbhijeet/PentestReport
- https://github.com/MedX267/EternalBlue-Vulnerability-Scanner
- https://github.com/MedzfarGapur/Medzfar-Gapur
- https://github.com/MenatiVyshnavi/internship-task-3-elevate-labs-
- https://github.com/MichaelColburn/externalblue_exploit_exploratory_sim
- https://github.com/Mickael5466/GG
- https://github.com/Mo-jaw0311/Reverse-TCP-Payload-Penetration-Test-
- https://github.com/MohammaD2020193/CyberThreat-Landscape-Report
- https://github.com/Mohammad-mo-02/Cyber-Physical-Security-Labs
- https://github.com/Monsterlallu/Agori-Baba
- https://github.com/Monsterlallu/Cyber-Kunjaali
- https://github.com/Monsterlallu/Top-500-hacking-tools
- https://github.com/NetworkingPassionate/Nessus-Essentials
- https://github.com/NeuromorphicComputationResearchProgram/ClarAVy
- https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense
- https://github.com/NoelBradford/Windows11-Hardening-Powershell-Scripts
- https://github.com/OmmAshutosh/EL_Internship_Task-3
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PWN-Kingdom/Test_Tasks
- https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups
- https://github.com/Phranavh28/vulnerability-management-azure-vm
- https://github.com/PotiteBulle/CVE20170144_EternalCustom
- https://github.com/Pranav-V-20/Windows-7-Exploitation-Using-Metasploit
- https://github.com/Project-WARMIND/Exploit-Modules
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/QWERTSKIHACK/awesome-termux-hacking
- https://github.com/R-Vision/ms17-010
- https://github.com/R0B1NL1N/AD-Attack-Defense
- https://github.com/RTKartograph/MS17-010-DetectorTool
- https://github.com/Ratlesv/Scan4all
- https://github.com/RedYetiDev/RedYetiDev
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
- https://github.com/Rockydirector/CS_Intern_task3
- https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API
- https://github.com/SNGWN/CEH-Notes
- https://github.com/SaintsConnor/Exploits
- https://github.com/Sampeerez/eJPT-notes
- https://github.com/SantoriuHen/NotesHck
- https://github.com/SatenderKumar3024/CompTIA-Cloud-Certification-Exam---EXAM-NUMBER-CV0-004---Satender-Kumar
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/ShubhamGuptaIN/WannaCry-ransomware-attack-Virus
- https://github.com/SirElmard/ethical_hacking
- https://github.com/SoLuckyMan/MaxPatrolSIEM
- https://github.com/Sriram080604/Openvas-scan-report
- https://github.com/Theophile-Wemaere/poc-on-github-downloader
- https://github.com/Totes5706/TotesHTB
- https://github.com/UNO-Babb/CYBR1100
- https://github.com/VOIDSEQ/RansomGuard
- https://github.com/Vaneeza-7/Eternal-Blue-Exploit
- https://github.com/ViktorParkhomenko/Malware-analysis-lab-with-FLARE-VM
- https://github.com/VishuGahlyan/OSCP
- https://github.com/VpSanta3/Rscan
- https://github.com/Whiteh4tWolf/Attack-Defense
- https://github.com/Yehender/tkpentest
- https://github.com/ZTK-009/Aggressor
- https://github.com/ZTK-009/Ladon
- https://github.com/ZTK-009/PowerLadon
- https://github.com/ZTheH/netmap
- https://github.com/ZeeRahul/Eternal-Blue-Vulnerability-Exploitation
- https://github.com/Zeyad-Azima/Remedy4me
- https://github.com/ZyberPatrol/Active-Directory
- https://github.com/abbasahsan1/abbasahsan1
- https://github.com/adevsec/EternalBLue-MS17-010-
- https://github.com/adeyholar/Foundation-Sec-8B-4b-quant
- https://github.com/ainfosec/tnok
- https://github.com/ajansha/EternalBlue
- https://github.com/ajb3932/AD_Pentesting
- https://github.com/alby0304/WannaCry_Analysis
- https://github.com/alex-chh/trae-ai-metasploit-mcp-integration
- https://github.com/almalikzakwan/Lemon-DuckAnalysis
- https://github.com/androidkey/MS17-011
- https://github.com/annusaiprasad/petya_malware_analysis
- https://github.com/ar2o3/Termux-Nation-2022-Alpha
- https://github.com/arnausubiros/metasploit-ms17-010_tryhackme
- https://github.com/aseams/Pentest-Toolkit
- https://github.com/ashishchandel06/WannaCry_Ransomware_Report.
- https://github.com/ashoka11/SimSpace_Cyber_Range_School_Project
- https://github.com/aymankhder/AD-attack-defense
- https://github.com/ayushkumar123a/cybersecurity-task1-portscan
- https://github.com/bachkhoasoft/ct-hacking-master
- https://github.com/badigervijay/AI-Based-Threat-Intelligence-Platform
- https://github.com/bhataasim1/AD-Attack-Defence
- https://github.com/boss-net/goscan
- https://github.com/bsbsmaster/OSCP-Cheat-Sheet
- https://github.com/bzuracyber/Automated-Vulnerability-Remediation
- https://github.com/c0mrade12211/Pentests
- https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode
- https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode
- https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag-
- https://github.com/chaao195/EBEKv2.0
- https://github.com/ckotugeh/smb-toolkit
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/cyberleelawat/LeelawatX-CVE-Hunter
- https://github.com/d01ki/BreachPilot
- https://github.com/d0n601/Pentest-Cheat-Sheet
- https://github.com/d4redevilx/eJPT-notes
- https://github.com/d4redevilx/eJPTv2-notes
- https://github.com/dita-cyber/SOC-L2-Interview-Prep
- https://github.com/diyarit/Ad-Peas
- https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144
- https://github.com/elsevar11/CVE_SCRAPER
- https://github.com/ericjiang97/SecScripts
- https://github.com/exfilt/CheatSheet
- https://github.com/fartaviao/tryhackme-blue
- https://github.com/fazilbaig1/oscp
- https://github.com/fernandopaezmartin/SAD_2021--Metasploit
- https://github.com/geeksniper/active-directory-pentest
- https://github.com/ginapalomo/ScanAll
- https://github.com/giriaryan694-a11y/exposed-win-zero-days
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-
- https://github.com/haginara/msrc-python
- https://github.com/heruidong/scan4all
- https://github.com/himera25/hacking-tools-2023
- https://github.com/himera25/termux-hacking
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/hktalent/scan4all
- https://github.com/hub-spot/Network-Security-Training
- https://github.com/ibrahimsaleem/PentestThinkingMCP
- https://github.com/ilona-baude/wireshark
- https://github.com/im4vk/IternalVlue
- https://github.com/infosecn1nja/AD-Attack-Defense
- https://github.com/itscio/Aggressor
- https://github.com/jbmihoub/all-poc
- https://github.com/jeffc04/vulnerability-management-program
- https://github.com/jithub07/vulnerability-scan-task
- https://github.com/jitmondal1/OSCP
- https://github.com/joyce8/MalDICT
- https://github.com/just0rg/Security-Interview
- https://github.com/k8gege/Aggressor
- https://github.com/k8gege/Ladon
- https://github.com/k8gege/PowerLadon
- https://github.com/kdcloverkid/https-github.com-kdcloverkid-awesome-termux-hacking
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/kimocoder/eternalblue
- https://github.com/koorchik/dissert
- https://github.com/koorchik/llm-analysis-of-text-data
- https://github.com/linghaomeng/YBYB-590-capstone
- https://github.com/lnick2023/nicenice
- https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144
- https://github.com/lxmrtnz/project-andromeda
- https://github.com/lycaleynes/NMAP-and-Wireshark
- https://github.com/lycaleynes/Nmap
- https://github.com/may215/awesome-termux-hacking
- https://github.com/mazharkhanpathan61354/cyber-security-internship-task-3
- https://github.com/merlinepedra/SCAN4LL
- https://github.com/merlinepedra25/SCAN4ALL-1
- https://github.com/micaelarg/vulnerability_scanner_public
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
- https://github.com/monjheta/windowserverr2
- https://github.com/monsifhmouri/BlackSun
- https://github.com/moromerx/vuln-crud-api
- https://github.com/moromerx/vuln-tracker-api
- https://github.com/mrk336/CVE-2025-55234
- https://github.com/mssky9527/Rscan
- https://github.com/n0-traces/cve_monitor
- https://github.com/nadeemali79/AD-Attack-Defense
- https://github.com/naufalazhar65/ETHICAL-HACKING-DOCS
- https://github.com/ndouglas-cloudsmith/exploit-check
- https://github.com/nenandjabhata/CTFs-Journey
- https://github.com/nirsarkar/scan4all
- https://github.com/nitinsanap95-hash/Elevate-Lab-Project----50-Question-Ansers
- https://github.com/nullaresponsio/Eternal-Pulse-5.2
- https://github.com/onebyte0x00/Cyber_svchost.exe
- https://github.com/oscpname/OSCP_cheat
- https://github.com/osogi/NTO_2022
- https://github.com/paramint/AD-Attack-Defense
- https://github.com/parth45/cheatsheet
- https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework-
- https://github.com/peterpt/eternal_scanner
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/quynhold/Detect-CVE-2017-0144-attack
- https://github.com/r-a-h-u-l2325/patch_management_report.md-Detailed-report-
- https://github.com/ramyardaneshgar/NetworkServices
- https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs
- https://github.com/redteammember/Malware-Analysis
- https://github.com/retr0-13/AD-Attack-Defense
- https://github.com/revanmalang/OSCP
- https://github.com/rgzi/eJPTv2-Notes
- https://github.com/ritheesh0/SOC-Incident-Response-Lab
- https://github.com/rjjoyce/MalDICT
- https://github.com/ronak4044/Cybersecurity-Task3
- https://github.com/roomkangali/DursVuln-Database
- https://github.com/roomkangali/DursVulnNSE
- https://github.com/rvsvishnuv/rvsvishnuv.github.io
- https://github.com/sethwhy/BlueDoor
- https://github.com/shaoo0l/elevate-labs-task-3
- https://github.com/shaxana/cve_project_akm
- https://github.com/shubhamg0sai/All_top_500_hacking_tool
- https://github.com/shubhamg0sai/top_500_tool
- https://github.com/skeeperloyaltie/network
- https://github.com/skhjacksonheights/bestTermuxTools_skh
- https://github.com/skjortan23/read-team-mcp-server
- https://github.com/speinador/ADVulnScan
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/starlingvibes/TryHackMe
- https://github.com/subha-86/nessus_vulnerability-scanning
- https://github.com/sudotsu/termuxhacking
- https://github.com/suman-git74/Vulnerability-Scanner
- https://github.com/sunzu94/AD-Attack-Defense
- https://github.com/sweetpotatohack/akuma-advanced-scanner
- https://github.com/sworatz/toolx500
- https://github.com/syedayman/Network-PenTest-Project
- https://github.com/syedayman/Penetration-Test
- https://github.com/tanjiti/sec_profile
- https://github.com/tataev/Security
- https://github.com/tempiltin/active-directory_pentest
- https://github.com/theh1t3sh/CTF
- https://github.com/thekarunakarreddy/Enterprise-Security-Assessment
- https://github.com/threatsurfer/cve-attack-mapper
- https://github.com/tmwf1475/AegisGuard
- https://github.com/trhacknon/scan4all
- https://github.com/txuswashere/OSCP
- https://github.com/uroboros-security/SMB-CVE
- https://github.com/vjp-albertoVG/PPS-Unidad3Actividad2-AlbertoVG
- https://github.com/vjp-pabloGG/PPS-Unidad3Actividad2-PabloGil
- https://github.com/w3security/goscan
- https://github.com/waleedelsmedesy22/EternalBlue-DoublePulsar-Exploit-Windows-7-
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/willamygarcia/Vuln_Windows_7_11
- https://github.com/witblack/G3nius-Tools-Sploit
- https://github.com/wuvel/TryHackMe
- https://github.com/xasyhack/oscp2025
- https://github.com/xasyhack/oscp_cheat_sheet_2025
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xhref/OSCP
- https://github.com/y102Abinash/Vulnerable-_-nessus-scan-report
- https://github.com/yaakulya123/casestudies
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yp-ww/HTB-CheatSheet
- https://github.com/yzk0b/TERMUX-RD
- https://github.com/zorikcherfas/eternalblue_linux_cpp