A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
- http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html
- http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html
- http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html
- http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html
- https://github.com/0day404/vulnerability-poc
- https://github.com/0kraven/MalDevJournal
- https://github.com/0x06K/MalDevJournal
- https://github.com/0x25bit/CVE-2020-0796-PoC
- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/0xcyberpj/windows-exploitation
- https://github.com/0xeb-bp/cve-2020-0796
- https://github.com/0xpetros/windows-privilage-escalation
- https://github.com/0xsyr0/OSCP
- https://github.com/1060275195/SMBGhost
- https://github.com/1stPeak/CVE-2020-0796-Scanner
- https://github.com/20142995/pocsuite
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/2522595153/text
- https://github.com/2lambda123/CVE-mitre
- https://github.com/2lambda123/Windows10Exploits
- https://github.com/3gstudent/Homework-of-Python
- https://github.com/5l1v3r1/CVE-2020-0796-PoC-3
- https://github.com/5l1v3r1/CVE-2020-0796-PoC-and-Scan
- https://github.com/5l1v3r1/SMBGhost_Crash_Poc
- https://github.com/5l1v3r1/SMBGhosts
- https://github.com/5l1v3r1/cve-2020-0802
- https://github.com/5l1v3r1/smbghost-5
- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ASR511-OO7/windows-kernel-exploits
- https://github.com/ASkyeye/RAGINGBULL
- https://github.com/AaronCaiii/CVE-2020-0796-POC
- https://github.com/AdamSonov/smbGhostCVE-2020-0796
- https://github.com/Aekras1a/CVE-2020-0796-PoC
- https://github.com/Ajomix/CVE-2020-0796
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module
- https://github.com/Almorabea/SMBGhost-WorkaroundApplier
- https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker
- https://github.com/ArrestX/--POC
- https://github.com/Ascotbe/Kernelhub
- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Aslamlatheef/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/AutumnIF/1_UP_files
- https://github.com/BC-SECURITY/Moriarty
- https://github.com/BOFs/365CS
- https://github.com/BOFs/CobaltStrike
- https://github.com/Barriuso/SMBGhost_AutomateExploitation
- https://github.com/BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796
- https://github.com/BunNYb8989/Conti
- https://github.com/ButrintKomoni/cve-2020-0796
- https://github.com/COVID-19-CTI-LEAGUE/PRIVATE_Medical_infra_vuln
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike
- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections
- https://github.com/Chrisync/CVE-Scanner
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Cruxer8Mech/Idk
- https://github.com/CyberMonitor/somethingweneed
- https://github.com/DanielBodnar/my-awesome-stars
- https://github.com/DanielFEXKEX/CVE-Scanner
- https://github.com/DannyRavi/nmap-scripts
- https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-Testing
- https://github.com/DreamoneOnly/CVE-2020-0796-LPE
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/EncodeGroup/BOF-RegSave
- https://github.com/EnriqueSanchezdelVillar/NotesHck
- https://github.com/F6JO/CVE-2020-0796-Batch-scanning
- https://github.com/FULLSHADE/WindowsExploitationResources
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/Fernandonov21/CVE
- https://github.com/Getshell/CobaltStrike
- https://github.com/GhostTroops/TOP
- https://github.com/GizzZmo/Windows-11-pentest
- https://github.com/GryllsAaron/CVE-2020-0796-POC
- https://github.com/GuoKerS/Some_Script
- https://github.com/GuoKerS/aioScan_CVE-2020-0796
- https://github.com/H4niz/oscp-note
- https://github.com/HackOvert/awesome-bugs
- https://github.com/HarshRajSinghania/smbvulnrecon
- https://github.com/Hatcat123/my_stars
- https://github.com/HernanRodriguez1/Dorks-Shodan-2023
- https://github.com/IAreKyleW00t/SMBGhosts
- https://github.com/IFccTeR/1_UP_files
- https://github.com/IFunFox/1_UP_files
- https://github.com/INotGreen/SharpScan
- https://github.com/IvanVoronov/0day
- https://github.com/JERRY123S/all-poc
- https://github.com/Jacob10s/SMBGHOST_EXPLOIT
- https://github.com/Jagadeesh7532/-CVE-2020-0796-SMBGhost-Windows-10-SMBv3-Remote-Code-Execution-Vulnerability
- https://github.com/Jalexander798/JA_Tools-0xsp-Mongoose
- https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation
- https://github.com/JaneMandy/Spirit
- https://github.com/Jkrasher/WindowsThreatResearch_JKrasher
- https://github.com/Kaizzzo1/CVE-2020-0796
- https://github.com/Kaizzzo1/cve-2020-00796
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Ken-Abruzzi/cve_2020_0796
- https://github.com/KernelKraze/smb_bulescreen_attack
- https://github.com/Kiosec/Windows-Exploitation
- https://github.com/Klein-xiao/HackTheBox
- https://github.com/LabDookhtegan/CVE-2020-0796-EXP
- https://github.com/Loveforkeeps/Lemon-Duck
- https://github.com/LuisMateo1/Cyber-Quests-Fall-2024-CTF-Challange
- https://github.com/MarcoMuzz/encrypt
- https://github.com/MasterSploit/LPE---CVE-2020-0796
- https://github.com/Mehedi-Babu/active_directory_chtsht
- https://github.com/MinYoungLeeDev/Attack-Defense-Analysis-of-a-Vulnerable-Network
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/MizaruIT/PENTAD-TOOLKIT
- https://github.com/MizaruIT/PENTADAY_TOOLKIT
- https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC
- https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/NitroA/windowsexpoitationresources
- https://github.com/NoTsPepino/Shodan-Dorking
- https://github.com/NullArray/WinKernel-Resources
- https://github.com/ORCA666/CVE-2020-0796
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/OldDream666/cve-2020-0796
- https://github.com/Opensitoo/cve-2020-0796
- https://github.com/Osiris9211/Task-3-Vulnerability-Scan-Report
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PDFSage/Eternal_Pulse_Corporate_Open_Source
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/QWERTSKIHACK/Active-Directory-Exploitation-Cheat-Sheet.
- https://github.com/RP01XXX/internalpentesting
- https://github.com/Ra7mo0on/SMBGhost
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
- https://github.com/RiderTimeDecade/fscan
- https://github.com/RonnieNiu/CVE-2020_0796-exp
- https://github.com/Rvn0xsy/CVE_2020_0796_CNA
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories
- https://github.com/S3cur3Th1sSh1t/WinPwn
- https://github.com/SEHandler/CVE-2020-0796
- https://github.com/SV223/TryHackMe-Conti
- https://github.com/SantoriuHen/NotesHck
- https://github.com/SecWiki/windows-kernel-exploits
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SexurityAnalyst/WinPwn
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Sincan2/Wincok-11-dan-10-BOSD
- https://github.com/SirElmard/ethical_hacking
- https://github.com/SofianeHamlaoui/Conti-Clear
- https://github.com/SunnyThakur25/Cyber3DMap-Streamlit
- https://github.com/T0mcat3r/ALinks
- https://github.com/T13nn3s/CVE-2020-0796
- https://github.com/TBHIDK24/MalDevJournal
- https://github.com/TBHIDK57/MalDevJournal
- https://github.com/TamilHackz/windows-exploitation
- https://github.com/TheNorthernLight/InfoSec_h2
- https://github.com/Threekiii/Awesome-POC
- https://github.com/TinToSer/CVE-2020-0796-LPE
- https://github.com/TinToSer/cve2020-0796
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/UraSecTeam/smbee
- https://github.com/ViniciusClement/OSCP_2025
- https://github.com/VishuGahlyan/OSCP
- https://github.com/VpSanta3/Rscan
- https://github.com/WhileEndless/NucleiTemplateDocumentation
- https://github.com/WinMin/Protocol-Vul
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/YannickAtabong9/CONTI
- https://github.com/Yehender/tkpentest
- https://github.com/ZTK-009/Aggressor
- https://github.com/ZTK-009/Ladon
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/ZecOps/CVE-2020-0796-LPE-POC
- https://github.com/ZecOps/CVE-2020-0796-RCE-POC
- https://github.com/ZecOps/SMBGhost-SMBleed-scanner
- https://github.com/ZeroHawkeye/gogo
- https://github.com/abdullah098/CVE_2020_0796
- https://github.com/agerKalboetxeaga/Proyecto2_Ciber
- https://github.com/albinjoshy03/windows-kernel-exploits
- https://github.com/albovy/ransomwareMALW
- https://github.com/aleperuz/Windows-Worm
- https://github.com/alian87/windows-kernel-exploits
- https://github.com/anquanscan/sec-tools
- https://github.com/apokryptein/secinject
- https://github.com/arzuozkan/CVE-2020-0796
- https://github.com/asr511/windows-kernel-exploits
- https://github.com/atdpa4sw0rd/Experience-library
- https://github.com/awareseven/eternalghosttest
- https://github.com/awsassets/CVE-2020-0798
- https://github.com/aymankhder/AD-esploitation-cheatsheet
- https://github.com/azhangyuhe/the-sun
- https://github.com/bacth0san96/SMBGhostScanner
- https://github.com/bdisann/ehmylist
- https://github.com/bmphx2/PoC-codes
- https://github.com/bonesg/CVE-2020-0797
- https://github.com/bsec404/CVE-2020-0796
- https://github.com/bsec404/cve-2020-00796
- https://github.com/by-roj/24_Vulnerability-Analysis-and-PoC-Reimplementation
- https://github.com/byoniq/Security-Resources
- https://github.com/cepxeo/redteambins
- https://github.com/chompie1337/SMBGhost_RCE_PoC
- https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-
- https://github.com/coksl/oss-cloudes
- https://github.com/cory-zajicek/CVE-2020-0796-DoS
- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/cybermads/CVE-2020-0796
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/danielbodnar/my-awesome-stars
- https://github.com/danigargu/CVE-2020-0796
- https://github.com/danyk20/pentest
- https://github.com/datntsec/CVE-2020-0796
- https://github.com/datntsec/CVE-2020-1206
- https://github.com/dawnadvent/Taiji
- https://github.com/ddiako/Vulncheck
- https://github.com/demilson/Windows
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dickens88/cve-2020-0796-scanner
- https://github.com/direwolf314/prescup_cheatsheet
- https://github.com/dita-cyber/SOC-L2-Interview-Prep
- https://github.com/doylej123/jack-doyle-project
- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/dungnm24/CVE-2020-0796
- https://github.com/eastmountyxz/CSDNBlog-Security-Based
- https://github.com/eastmountyxz/CVE-2020-0796-SMB
- https://github.com/eastmountyxz/NetworkSecuritySelf-study
- https://github.com/eastmountyxz/SystemSecurity-ReverseAnalysis
- https://github.com/edsonjt81/dazzleUP
- https://github.com/eerykitty/CVE-2020-0796-PoC
- https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/elinakrmova/WinPwn
- https://github.com/emtee40/win-pwn
- https://github.com/ericzhong2010/GUI-Check-CVE-2020-0976
- https://github.com/esmwaSpyware/DoS-PoC-for-CVE-2020-0796-SMBGhost-
- https://github.com/eventsentry/scripts
- https://github.com/exfilt/CheatSheet
- https://github.com/exp-sky/CVE-2020-0796
- https://github.com/f1tz/CVE-2020-0796-LPE-EXP
- https://github.com/fazilbaig1/oscp
- https://github.com/fei9747/Awesome-CobaltStrike
- https://github.com/fei9747/WindowsElevation
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/gabimarti/SMBScanner
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/githuberxu/Safety-Books
- https://github.com/gnusec/soapffzblogposts_backup
- https://github.com/gourav5g/Perform-a-Basic-Vulnerability-Scan-on-Your-PC.
- https://github.com/h7ml/h7ml
- https://github.com/hack-parthsharma/WinPwn
- https://github.com/halsten/CVE-2020-0796
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hectorgie/SMBGHOST
- https://github.com/heeloo123/CVE-2020-0796
- https://github.com/hegusung/netscan
- https://github.com/hello12324/smb_bulescreen_attack
- https://github.com/hillu/nmap-nse-smb2-enhancement
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/hlldz/dazzleUP
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/huimzjty/vulwiki
- https://github.com/huisetiankong478/penetration_poc
- https://github.com/huisetiankong478/poc
- https://github.com/hungdnvp/POC-CVE-2020-0796
- https://github.com/hwiwonl/dayone
- https://github.com/i0gan/cve
- https://github.com/iamramahibrah/NSE-Scripts
- https://github.com/intelliroot-tech/cve-2020-0796-Scanner
- https://github.com/ioncodes/SMBGhost
- https://github.com/itscio/Aggressor
- https://github.com/jamf/CVE-2020-0796-LPE-POC
- https://github.com/jamf/CVE-2020-0796-RCE-POC
- https://github.com/jamf/SMBGhost-SMBleed-scanner
- https://github.com/jbmihoub/all-poc
- https://github.com/jeansgit/Pentest
- https://github.com/jiansiting/CVE-2020-0796
- https://github.com/jiansiting/CVE-2020-0796-Scanner
- https://github.com/jitmondal1/OSCP
- https://github.com/joaozietolie/CVE-2020-0796-Checker
- https://github.com/jstigerwalt/SMBGhost
- https://github.com/julixsalas/CVE-2020-0796
- https://github.com/jweny/pocassistdb
- https://github.com/k0imet/CVE-POCs
- https://github.com/k4t3pro/SMBGhost
- https://github.com/k8gege/Aggressor
- https://github.com/k8gege/Ladon
- https://github.com/k8gege/PyLadon
- https://github.com/kdandy/WinPwn
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/khulnasoft-lab/awesome-security
- https://github.com/khulnasoft-labs/awesome-security
- https://github.com/kiranjpjk/Penetration-Testing-VMs-and-Web
- https://github.com/kn6869610/CVE-2020-0796
- https://github.com/krizzz07/CVE-2020-0796
- https://github.com/lanyi1998/TZ
- https://github.com/laolisafe/CVE-2020-0796
- https://github.com/lawrenceamer/0xsp-Mongoose
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lisinan988/CVE-2020-0796-exp
- https://github.com/lnick2023/nicenice
- https://github.com/lsc1226844309/hanker1
- https://github.com/ly4k/SMBGhost
- https://github.com/lyshark/Windows-exploits
- https://github.com/madanokr001/CVE-2020-0796
- https://github.com/mai-lang-chai/System-Vulnerability
- https://github.com/manasmbellani/gocmdscanner
- https://github.com/manoz00/mm
- https://github.com/maqeel-git/CVE-2020-0796
- https://github.com/maqeel-git/maqeel
- https://github.com/marcinguy/CVE-2020-0796
- https://github.com/mathisvickie/KMAC
- https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC
- https://github.com/merlinepedra/CobaltStrike
- https://github.com/merlinepedra25/CobaltStrike
- https://github.com/micaelarg/vulnerability_scanner_public
- https://github.com/michael101096/cs2020_msels
- https://github.com/mishmashclone/SecWiki-windows-kernel-exploits
- https://github.com/monjheta/CVE-2020-0796
- https://github.com/mranv/adPentest
- https://github.com/mssky9527/Rscan
- https://github.com/msuiche/smbaloo
- https://github.com/mxdelta/DOMAIN
- https://github.com/n0-traces/cve_monitor
- https://github.com/netkid123/WinPwn-1
- https://github.com/netscylla/SMBGhost
- https://github.com/nholuongut/active-directory-exploitation-cheat-sheet
- https://github.com/nicolas-gagnon/windows-kernel-exploits
- https://github.com/nitromagix/iam-1-cybersecurity-current-event-report
- https://github.com/niudaii/go-crack
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/Windows10Exploits
- https://github.com/nullaresponsio/Eternal-Pulse-5.2
- https://github.com/nullaresponsio/Eternal_Pulse_Open_Source
- https://github.com/orangmuda/CVE-2020-0796
- https://github.com/oscpname/OSCP_cheat
- https://github.com/paramint/windows-kernel-exploits
- https://github.com/parth45/cheatsheet
- https://github.com/password520/Penetration_PoC
- https://github.com/pathakabhi24/Awesome-C
- https://github.com/pawan-shivarkar/pawan-shivarkar
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/pentration/gongkaishouji
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/polarityio/youtube
- https://github.com/psc4re/NSE-scripts
- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/pwninx/WinPwn
- https://github.com/pwnlog/ALinks
- https://github.com/pwnlog/PAD
- https://github.com/pwnlog/PuroAD
- https://github.com/pwnlog/PurpAD
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qbit6634/Threat-Intel-Brief
- https://github.com/rainmana/awesome-rainmana
- https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/ran-sama/CVE-2020-0796
- https://github.com/readloud/Awesome-Stars
- https://github.com/reewardius/0day
- https://github.com/resinprotein2333/Vlun-Finder-bot
- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/retr0-13/WinPwn
- https://github.com/revanmalang/OSCP
- https://github.com/rhpenguin/tshark-filter
- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG
- https://github.com/root26/bug
- https://github.com/rsmudge/CVE-2020-0796-BOF
- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/s3mPr1linux/JUST_WALKING_DOG
- https://github.com/safesword/WindowsExp
- https://github.com/shadowdevnotreal/Awesome-CobaltStrike
- https://github.com/shanyuhe/YesPoc
- https://github.com/shengshengli/NetworkSecuritySelf-study
- https://github.com/shuanx/vulnerability
- https://github.com/silencer929/SMBGhost
- https://github.com/soapffz/soapffzblogposts
- https://github.com/soosmile/POC
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/stalker3343/diplom
- https://github.com/sujitawake/smbghost
- https://github.com/sung3r/CobaltStrike
- https://github.com/supermandw2018/SystemSecurity-ReverseAnalysis
- https://github.com/svbjdbk123/-
- https://github.com/sweetpotatohack/akuma-advanced-scanner
- https://github.com/sweetpotatohack/akuma-lowhanging-scanner
- https://github.com/syadg123/CVE-2020-0796
- https://github.com/syadg123/SMBGhost
- https://github.com/t0rt3ll1n0/cms-scanner
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tango-j/CVE-2020-0796
- https://github.com/tanjiti/sec_profile
- https://github.com/tdevworks/CVE-2020-0796-SMBGhost-Exploit-Demo
- https://github.com/tdevworks/CVE-2020-1472-ZeroLogon-Demo-Detection-Mitigation
- https://github.com/technion/DisableSMBCompression
- https://github.com/testbugonly/Defence
- https://github.com/thelostworldFree/CVE-2020-0796
- https://github.com/tijldeneut/Security
- https://github.com/tobor88/PowerShell-Blue-Team
- https://github.com/todo1024/1657
- https://github.com/trganda/starrlist
- https://github.com/tripledd/cve-2020-0796-vuln
- https://github.com/txuswashere/OSCP
- https://github.com/tyroneml/tyroneml
- https://github.com/uhub/awesome-c
- https://github.com/undefined-name12/Cheat-Sheet-Active-Directory
- https://github.com/vs4vijay/exploits
- https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-
- https://github.com/vysecurity/CVE-2020-0796
- https://github.com/w1ld3r/SMBGhost_Scanner
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/wenwen104/ipas2020
- https://github.com/whitfieldsdad/cisa_kev
- https://github.com/willamygarcia/Vuln_Windows_7_11
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wneessen/SMBCompScan
- https://github.com/wolfyy59/keylogger-C-
- https://github.com/wrlu/Vulnerabilities
- https://github.com/wsfengfan/CVE-2020-0796
- https://github.com/xax007/CVE-2020-0796-Scanner
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xhref/OSCP
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yanghaoi/ReflectiveDllSource
- https://github.com/ycdxsb/Exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/yisan1/hh
- https://github.com/ysyyrps123/CVE-2020-0796-exp
- https://github.com/z1un/Z1-AggressorScripts
- https://github.com/z3ena/Exploiting-and-Mitigating-CVE-2020-0796-SMBGhost-and-Print-Spooler-Vulnerabilities
- https://github.com/zathizh/cve-796-mit
- https://github.com/zer0yu/Awesome-CobaltStrike
- https://github.com/zerodayblitz/NetSuite-network-exploitation-tool
- https://github.com/zhanpengliu-tencent/medium-cve
- https://github.com/zhouzu/SMBGhost-Full-RCE
- https://github.com/zux0x3a/0xsp-Mongoose
- https://github.com/zzyss-marker/NetworkSecuritySelf-study