Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.# Zer0Dump
Zer0dump is an PoC exploit/tool for abusing the vulnerabilities associated with CVE-2020-1472 (Zerologon) in order
to initiate a full system takeover of an unpatched Windows domain controller.
Special thanks to [@dirkjanm](https://github.com/dirkjanm) and [@SecureAuthCorp](https://github.com/SecureAuthCorp/impacket)
[4.0K] /data/pocs/818763a0f172427c86c4b5818f722fc5e93b2399
├── [ 20K] psexec.py
├── [4.0K] __pycache__
│ ├── [ 15K] psexec.cpython-38.pyc
│ ├── [ 13K] reg.cpython-38.pyc
│ └── [ 11K] secretsdump.cpython-38.pyc
├── [ 331] README.md
├── [ 19K] reg.py
├── [1.5K] requirements.txt
├── [ 20K] secretsdump.py
└── [6.8K] zer0dump.py
1 directory, 9 files