Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0796 PoC — 微软 Microsoft SMBv3 缓冲区错误漏洞

Source
Associated Vulnerability
Title:微软 Microsoft SMBv3 缓冲区错误漏洞 (CVE-2020-0796)
Description:A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
Description
DoS PoC for CVE-2020-0796 (SMBGhost)
Readme
# CVE-2020-0796 DoS PoC (SMBGhost)
A simple demonstration exploiting CVE-2020-0796. This script will induce a BSoD in vulnerable machines.  
Pure Python 3 with no additional dependencies required.

### Usage
`python CVE-2020-0796-DoS.py <target IP>`

### Credit
Hard-coded packet data was derived from [this PoC script by maxpl0it.](https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC)
File Snapshot

[4.0K] /data/pocs/2cdf585e76027ed0118d336b91dc0b50f9a8c471 ├── [ 834] CVE-2020-0796-DoS.py ├── [1.0K] LICENSE └── [ 396] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →