Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2020-0796

Description

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.

POC

Reference

- http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html

- http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html

- http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html

- http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0kraven/MalDevJournal

- https://github.com/0x06K/MalDevJournal

- https://github.com/0x25bit/CVE-2020-0796-PoC

- https://github.com/0xMarcio/cve

- https://github.com/0xT11/CVE-POC

- https://github.com/0xcyberpj/windows-exploitation

- https://github.com/0xeb-bp/cve-2020-0796

- https://github.com/0xpetros/windows-privilage-escalation

- https://github.com/0xsyr0/OSCP

- https://github.com/1060275195/SMBGhost

- https://github.com/1stPeak/CVE-2020-0796-Scanner

- https://github.com/20142995/pocsuite

- https://github.com/20142995/pocsuite3

- https://github.com/20142995/sectool

- https://github.com/2522595153/text

- https://github.com/2lambda123/CVE-mitre

- https://github.com/2lambda123/Windows10Exploits

- https://github.com/3gstudent/Homework-of-Python

- https://github.com/5l1v3r1/CVE-2020-0796-PoC-3

- https://github.com/5l1v3r1/CVE-2020-0796-PoC-and-Scan

- https://github.com/5l1v3r1/SMBGhost_Crash_Poc

- https://github.com/5l1v3r1/SMBGhosts

- https://github.com/5l1v3r1/cve-2020-0802

- https://github.com/5l1v3r1/smbghost-5

- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ASR511-OO7/windows-kernel-exploits

- https://github.com/ASkyeye/RAGINGBULL

- https://github.com/AaronCaiii/CVE-2020-0796-POC

- https://github.com/AdamSonov/smbGhostCVE-2020-0796

- https://github.com/Aekras1a/CVE-2020-0796-PoC

- https://github.com/Ajomix/CVE-2020-0796

- https://github.com/Al1ex/WindowsElevation

- https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module

- https://github.com/Almorabea/SMBGhost-WorkaroundApplier

- https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker

- https://github.com/ArrestX/--POC

- https://github.com/Ascotbe/Kernelhub

- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Aslamlatheef/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Astrogeorgeonethree/Starred

- https://github.com/Astrogeorgeonethree/Starred2

- https://github.com/Atem1988/Starred

- https://github.com/AutumnIF/1_UP_files

- https://github.com/BC-SECURITY/Moriarty

- https://github.com/BOFs/365CS

- https://github.com/BOFs/CobaltStrike

- https://github.com/Barriuso/SMBGhost_AutomateExploitation

- https://github.com/BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796

- https://github.com/BunNYb8989/Conti

- https://github.com/ButrintKomoni/cve-2020-0796

- https://github.com/COVID-19-CTI-LEAGUE/PRIVATE_Medical_infra_vuln

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike

- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections

- https://github.com/Chrisync/CVE-Scanner

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/Cruxer8Mech/Idk

- https://github.com/CyberMonitor/somethingweneed

- https://github.com/DanielBodnar/my-awesome-stars

- https://github.com/DanielFEXKEX/CVE-Scanner

- https://github.com/DannyRavi/nmap-scripts

- https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-Testing

- https://github.com/DreamoneOnly/CVE-2020-0796-LPE

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/EncodeGroup/BOF-RegSave

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/F6JO/CVE-2020-0796-Batch-scanning

- https://github.com/FULLSHADE/WindowsExploitationResources

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/Fernandonov21/CVE

- https://github.com/Getshell/CobaltStrike

- https://github.com/GhostTroops/TOP

- https://github.com/GizzZmo/Windows-11-pentest

- https://github.com/GryllsAaron/CVE-2020-0796-POC

- https://github.com/GuoKerS/Some_Script

- https://github.com/GuoKerS/aioScan_CVE-2020-0796

- https://github.com/H4niz/oscp-note

- https://github.com/HackOvert/awesome-bugs

- https://github.com/HarshRajSinghania/smbvulnrecon

- https://github.com/Hatcat123/my_stars

- https://github.com/HernanRodriguez1/Dorks-Shodan-2023

- https://github.com/IAreKyleW00t/SMBGhosts

- https://github.com/IFccTeR/1_UP_files

- https://github.com/IFunFox/1_UP_files

- https://github.com/INotGreen/SharpScan

- https://github.com/IvanVoronov/0day

- https://github.com/JERRY123S/all-poc

- https://github.com/Jacob10s/SMBGHOST_EXPLOIT

- https://github.com/Jagadeesh7532/-CVE-2020-0796-SMBGhost-Windows-10-SMBv3-Remote-Code-Execution-Vulnerability

- https://github.com/Jalexander798/JA_Tools-0xsp-Mongoose

- https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation

- https://github.com/JaneMandy/Spirit

- https://github.com/Jkrasher/WindowsThreatResearch_JKrasher

- https://github.com/Kaizzzo1/CVE-2020-0796

- https://github.com/Kaizzzo1/cve-2020-00796

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/Ken-Abruzzi/cve_2020_0796

- https://github.com/KernelKraze/smb_bulescreen_attack

- https://github.com/Kiosec/Windows-Exploitation

- https://github.com/Klein-xiao/HackTheBox

- https://github.com/LabDookhtegan/CVE-2020-0796-EXP

- https://github.com/Loveforkeeps/Lemon-Duck

- https://github.com/LuisMateo1/Cyber-Quests-Fall-2024-CTF-Challange

- https://github.com/MarcoMuzz/encrypt

- https://github.com/MasterSploit/LPE---CVE-2020-0796

- https://github.com/Mehedi-Babu/active_directory_chtsht

- https://github.com/MinYoungLeeDev/Attack-Defense-Analysis-of-a-Vulnerable-Network

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/MizaruIT/PENTAD-TOOLKIT

- https://github.com/MizaruIT/PENTADAY_TOOLKIT

- https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC

- https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources

- https://github.com/NetW0rK1le3r/awesome-hacking-lists

- https://github.com/NitroA/windowsexpoitationresources

- https://github.com/NoTsPepino/Shodan-Dorking

- https://github.com/NullArray/WinKernel-Resources

- https://github.com/ORCA666/CVE-2020-0796

- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame

- https://github.com/OldDream666/cve-2020-0796

- https://github.com/Opensitoo/cve-2020-0796

- https://github.com/Osiris9211/Task-3-Vulnerability-Scan-Report

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PDFSage/Eternal_Pulse_Corporate_Open_Source

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/QWERTSKIHACK/Active-Directory-Exploitation-Cheat-Sheet.

- https://github.com/RP01XXX/internalpentesting

- https://github.com/Ra7mo0on/SMBGhost

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/RiderTimeDecade/fscan

- https://github.com/RonnieNiu/CVE-2020_0796-exp

- https://github.com/Rvn0xsy/CVE_2020_0796_CNA

- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/S3cur3Th1sSh1t/WinPwn

- https://github.com/SEHandler/CVE-2020-0796

- https://github.com/SV223/TryHackMe-Conti

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SecWiki/windows-kernel-exploits

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/SexurityAnalyst/WinPwn

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Sincan2/Wincok-11-dan-10-BOSD

- https://github.com/SirElmard/ethical_hacking

- https://github.com/SofianeHamlaoui/Conti-Clear

- https://github.com/SunnyThakur25/Cyber3DMap-Streamlit

- https://github.com/T0mcat3r/ALinks

- https://github.com/T13nn3s/CVE-2020-0796

- https://github.com/TBHIDK24/MalDevJournal

- https://github.com/TBHIDK57/MalDevJournal

- https://github.com/TamilHackz/windows-exploitation

- https://github.com/TheNorthernLight/InfoSec_h2

- https://github.com/Threekiii/Awesome-POC

- https://github.com/TinToSer/CVE-2020-0796-LPE

- https://github.com/TinToSer/cve2020-0796

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/UraSecTeam/smbee

- https://github.com/ViniciusClement/OSCP_2025

- https://github.com/VishuGahlyan/OSCP

- https://github.com/VpSanta3/Rscan

- https://github.com/WhileEndless/NucleiTemplateDocumentation

- https://github.com/WinMin/Protocol-Vul

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/YannickAtabong9/CONTI

- https://github.com/Yehender/tkpentest

- https://github.com/ZTK-009/Aggressor

- https://github.com/ZTK-009/Ladon

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/ZecOps/CVE-2020-0796-LPE-POC

- https://github.com/ZecOps/CVE-2020-0796-RCE-POC

- https://github.com/ZecOps/SMBGhost-SMBleed-scanner

- https://github.com/ZeroHawkeye/gogo

- https://github.com/abdullah098/CVE_2020_0796

- https://github.com/agerKalboetxeaga/Proyecto2_Ciber

- https://github.com/albinjoshy03/windows-kernel-exploits

- https://github.com/albovy/ransomwareMALW

- https://github.com/aleperuz/Windows-Worm

- https://github.com/alian87/windows-kernel-exploits

- https://github.com/anquanscan/sec-tools

- https://github.com/apokryptein/secinject

- https://github.com/arzuozkan/CVE-2020-0796

- https://github.com/asr511/windows-kernel-exploits

- https://github.com/atdpa4sw0rd/Experience-library

- https://github.com/awareseven/eternalghosttest

- https://github.com/awsassets/CVE-2020-0798

- https://github.com/aymankhder/AD-esploitation-cheatsheet

- https://github.com/azhangyuhe/the-sun

- https://github.com/bacth0san96/SMBGhostScanner

- https://github.com/bdisann/ehmylist

- https://github.com/bmphx2/PoC-codes

- https://github.com/bonesg/CVE-2020-0797

- https://github.com/bsec404/CVE-2020-0796

- https://github.com/bsec404/cve-2020-00796

- https://github.com/by-roj/24_Vulnerability-Analysis-and-PoC-Reimplementation

- https://github.com/byoniq/Security-Resources

- https://github.com/cepxeo/redteambins

- https://github.com/chompie1337/SMBGhost_RCE_PoC

- https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-

- https://github.com/coksl/oss-cloudes

- https://github.com/cory-zajicek/CVE-2020-0796-DoS

- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cybermads/CVE-2020-0796

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/danielbodnar/my-awesome-stars

- https://github.com/danigargu/CVE-2020-0796

- https://github.com/danyk20/pentest

- https://github.com/datntsec/CVE-2020-0796

- https://github.com/datntsec/CVE-2020-1206

- https://github.com/dawnadvent/Taiji

- https://github.com/ddiako/Vulncheck

- https://github.com/demilson/Windows

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/dickens88/cve-2020-0796-scanner

- https://github.com/direwolf314/prescup_cheatsheet

- https://github.com/dita-cyber/SOC-L2-Interview-Prep

- https://github.com/doylej123/jack-doyle-project

- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/dungnm24/CVE-2020-0796

- https://github.com/eastmountyxz/CSDNBlog-Security-Based

- https://github.com/eastmountyxz/CVE-2020-0796-SMB

- https://github.com/eastmountyxz/NetworkSecuritySelf-study

- https://github.com/eastmountyxz/SystemSecurity-ReverseAnalysis

- https://github.com/edsonjt81/dazzleUP

- https://github.com/eerykitty/CVE-2020-0796-PoC

- https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/elinakrmova/WinPwn

- https://github.com/emtee40/win-pwn

- https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976

- https://github.com/esmwaSpyware/DoS-PoC-for-CVE-2020-0796-SMBGhost-

- https://github.com/eventsentry/scripts

- https://github.com/exfilt/CheatSheet

- https://github.com/exp-sky/CVE-2020-0796

- https://github.com/f1tz/CVE-2020-0796-LPE-EXP

- https://github.com/fazilbaig1/oscp

- https://github.com/fei9747/Awesome-CobaltStrike

- https://github.com/fei9747/WindowsElevation

- https://github.com/firatesatoglu/shodanSearch

- https://github.com/gabimarti/SMBScanner

- https://github.com/giterlizzi/secdb-feeds

- https://github.com/githuberxu/Safety-Books

- https://github.com/gnusec/soapffzblogposts_backup

- https://github.com/gourav5g/Perform-a-Basic-Vulnerability-Scan-on-Your-PC.

- https://github.com/h7ml/h7ml

- https://github.com/hack-parthsharma/WinPwn

- https://github.com/halsten/CVE-2020-0796

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hectorgie/SMBGHOST

- https://github.com/heeloo123/CVE-2020-0796

- https://github.com/hegusung/netscan

- https://github.com/hello12324/smb_bulescreen_attack

- https://github.com/hillu/nmap-nse-smb2-enhancement

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/hlldz/dazzleUP

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huimzjty/vulwiki

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/hungdnvp/POC-CVE-2020-0796

- https://github.com/hwiwonl/dayone

- https://github.com/i0gan/cve

- https://github.com/iamramahibrah/NSE-Scripts

- https://github.com/intelliroot-tech/cve-2020-0796-Scanner

- https://github.com/ioncodes/SMBGhost

- https://github.com/itscio/Aggressor

- https://github.com/jamf/CVE-2020-0796-LPE-POC

- https://github.com/jamf/CVE-2020-0796-RCE-POC

- https://github.com/jamf/SMBGhost-SMBleed-scanner

- https://github.com/jbmihoub/all-poc

- https://github.com/jeansgit/Pentest

- https://github.com/jiansiting/CVE-2020-0796

- https://github.com/jiansiting/CVE-2020-0796-Scanner

- https://github.com/jitmondal1/OSCP

- https://github.com/joaozietolie/CVE-2020-0796-Checker

- https://github.com/jstigerwalt/SMBGhost

- https://github.com/julixsalas/CVE-2020-0796

- https://github.com/jweny/pocassistdb

- https://github.com/k0imet/CVE-POCs

- https://github.com/k4t3pro/SMBGhost

- https://github.com/k8gege/Aggressor

- https://github.com/k8gege/Ladon

- https://github.com/k8gege/PyLadon

- https://github.com/kdandy/WinPwn

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/khulnasoft-lab/awesome-security

- https://github.com/khulnasoft-labs/awesome-security

- https://github.com/kiranjpjk/Penetration-Testing-VMs-and-Web

- https://github.com/kn6869610/CVE-2020-0796

- https://github.com/krizzz07/CVE-2020-0796

- https://github.com/lanyi1998/TZ

- https://github.com/laolisafe/CVE-2020-0796

- https://github.com/lawrenceamer/0xsp-Mongoose

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lisinan988/CVE-2020-0796-exp

- https://github.com/lnick2023/nicenice

- https://github.com/lsc1226844309/hanker1

- https://github.com/ly4k/SMBGhost

- https://github.com/lyshark/Windows-exploits

- https://github.com/madanokr001/CVE-2020-0796

- https://github.com/mai-lang-chai/System-Vulnerability

- https://github.com/manasmbellani/gocmdscanner

- https://github.com/manoz00/mm

- https://github.com/maqeel-git/CVE-2020-0796

- https://github.com/maqeel-git/maqeel

- https://github.com/marcinguy/CVE-2020-0796

- https://github.com/mathisvickie/KMAC

- https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC

- https://github.com/merlinepedra/CobaltStrike

- https://github.com/merlinepedra25/CobaltStrike

- https://github.com/micaelarg/vulnerability_scanner_public

- https://github.com/michael101096/cs2020_msels

- https://github.com/mishmashclone/SecWiki-windows-kernel-exploits

- https://github.com/monjheta/CVE-2020-0796

- https://github.com/mranv/adPentest

- https://github.com/mssky9527/Rscan

- https://github.com/msuiche/smbaloo

- https://github.com/mxdelta/DOMAIN

- https://github.com/n0-traces/cve_monitor

- https://github.com/netkid123/WinPwn-1

- https://github.com/netscylla/SMBGhost

- https://github.com/nholuongut/active-directory-exploitation-cheat-sheet

- https://github.com/nicolas-gagnon/windows-kernel-exploits

- https://github.com/nitromagix/iam-1-cybersecurity-current-event-report

- https://github.com/niudaii/go-crack

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nu11secur1ty/CVE-mitre

- https://github.com/nu11secur1ty/CVE-nu11secur1ty

- https://github.com/nu11secur1ty/Windows10Exploits

- https://github.com/nullaresponsio/Eternal-Pulse-5.2

- https://github.com/nullaresponsio/Eternal_Pulse_Open_Source

- https://github.com/orangmuda/CVE-2020-0796

- https://github.com/oscpname/OSCP_cheat

- https://github.com/paramint/windows-kernel-exploits

- https://github.com/parth45/cheatsheet

- https://github.com/password520/Penetration_PoC

- https://github.com/pathakabhi24/Awesome-C

- https://github.com/pawan-shivarkar/pawan-shivarkar

- https://github.com/pengusec/awesome-netsec-articles

- https://github.com/pentration/gongkaishouji

- https://github.com/pharo-sec/OSCP-Cheat-Sheet

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/polarityio/youtube

- https://github.com/psc4re/NSE-scripts

- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/pwninx/WinPwn

- https://github.com/pwnlog/ALinks

- https://github.com/pwnlog/PAD

- https://github.com/pwnlog/PuroAD

- https://github.com/pwnlog/PurpAD

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/qbit6634/Threat-Intel-Brief

- https://github.com/rainmana/awesome-rainmana

- https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/ran-sama/CVE-2020-0796

- https://github.com/readloud/Awesome-Stars

- https://github.com/reewardius/0day

- https://github.com/resinprotein2333/Vlun-Finder-bot

- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/retr0-13/WinPwn

- https://github.com/revanmalang/OSCP

- https://github.com/rhpenguin/tshark-filter

- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG

- https://github.com/root26/bug

- https://github.com/rsmudge/CVE-2020-0796-BOF

- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/s3mPr1linux/JUST_WALKING_DOG

- https://github.com/safesword/WindowsExp

- https://github.com/shadowdevnotreal/Awesome-CobaltStrike

- https://github.com/shanyuhe/YesPoc

- https://github.com/shengshengli/NetworkSecuritySelf-study

- https://github.com/shuanx/vulnerability

- https://github.com/silencer929/SMBGhost

- https://github.com/soapffz/soapffzblogposts

- https://github.com/soosmile/POC

- https://github.com/sponkmonk/Ladon_english_update

- https://github.com/stalker3343/diplom

- https://github.com/sujitawake/smbghost

- https://github.com/sung3r/CobaltStrike

- https://github.com/supermandw2018/SystemSecurity-ReverseAnalysis

- https://github.com/svbjdbk123/-

- https://github.com/sweetpotatohack/akuma-advanced-scanner

- https://github.com/sweetpotatohack/akuma-lowhanging-scanner

- https://github.com/syadg123/CVE-2020-0796

- https://github.com/syadg123/SMBGhost

- https://github.com/t0rt3ll1n0/cms-scanner

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/tango-j/CVE-2020-0796

- https://github.com/tanjiti/sec_profile

- https://github.com/tdevworks/CVE-2020-0796-SMBGhost-Exploit-Demo

- https://github.com/tdevworks/CVE-2020-1472-ZeroLogon-Demo-Detection-Mitigation

- https://github.com/technion/DisableSMBCompression

- https://github.com/testbugonly/Defence

- https://github.com/thelostworldFree/CVE-2020-0796

- https://github.com/tijldeneut/Security

- https://github.com/tobor88/PowerShell-Blue-Team

- https://github.com/todo1024/1657

- https://github.com/trganda/starrlist

- https://github.com/tripledd/cve-2020-0796-vuln

- https://github.com/txuswashere/OSCP

- https://github.com/tyroneml/tyroneml

- https://github.com/uhub/awesome-c

- https://github.com/undefined-name12/Cheat-Sheet-Active-Directory

- https://github.com/vs4vijay/exploits

- https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-

- https://github.com/vysecurity/CVE-2020-0796

- https://github.com/w1ld3r/SMBGhost_Scanner

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/wenwen104/ipas2020

- https://github.com/whitfieldsdad/cisa_kev

- https://github.com/willamygarcia/Vuln_Windows_7_11

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/wneessen/SMBCompScan

- https://github.com/wolfyy59/keylogger-C-

- https://github.com/wrlu/Vulnerabilities

- https://github.com/wsfengfan/CVE-2020-0796

- https://github.com/xax007/CVE-2020-0796-Scanner

- https://github.com/xbl2022/awesome-hacking-lists

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xhref/OSCP

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yanghaoi/ReflectiveDllSource

- https://github.com/ycdxsb/Exploits

- https://github.com/ycdxsb/WindowsPrivilegeEscalation

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji

- https://github.com/yisan1/hh

- https://github.com/ysyyrps123/CVE-2020-0796-exp

- https://github.com/z1un/Z1-AggressorScripts

- https://github.com/z3ena/Exploiting-and-Mitigating-CVE-2020-0796-SMBGhost-and-Print-Spooler-Vulnerabilities

- https://github.com/zathizh/cve-796-mit

- https://github.com/zer0yu/Awesome-CobaltStrike

- https://github.com/zerodayblitz/NetSuite-network-exploitation-tool

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zhouzu/SMBGhost-Full-RCE

- https://github.com/zux0x3a/0xsp-Mongoose

- https://github.com/zzyss-marker/NetworkSecuritySelf-study