-
└─# python3 win7_32_poc.py 130 ⨯
[+] initializing connection
[+] sending basic settings exchange
[+] sending erect domain and attach user
[+] se…
-
Hi, I'm trying to find a bluekeep payload x86 version for xp-2003.
In my archive there's only x64 versions. Searched quite everywhere but unable to find the x86 (original) version of payloads. My tes…
-
> Exploit failed [disconnected]: Errno::ECONNRESET Connection reset by peer
This is also the case when I try a physical machine.
_Originally posted by @a62rzn in https://github.com/rapid7/metasp…
-
Hello,
I am trying to use pyrdp with a windows 7 to act as a honeypot for rdp bluekeep exploit. I test the windows 7 vm directly and the bluekeep poc work. I am using https://github.com/Ekultek/Blu…
-
The heap spray part that was missing for full RCE and bypassing ASLR/DEP is discussed in multiple papers. Did you lost interest or should I make a pull request and finish this exploit to a working RCE…
-
![error](https://user-images.githubusercontent.com/59295100/71532556-bd960900-2915-11ea-97c1-f145ba316b56.PNG)
I have tried all the vulnerable RDP IPs, which are actually vulnerable, but all the time…
-
Hello, Ekultek. I'm a college student from School of Cyberspace Security, BUPT, in China. I took a course named Network Security Experiment last term and I found great interest in it. So this summer h…
-
A POC has finally been released [here](https://github.com/Ekultek/BlueKeep), and this is great for pentests against networks with older Windows machines, as the XP/2003 machines have a patch but not a…
-
## Steps to reproduce
Search something in msfconsole, name column is empty
Screenshot:
![msfsearch](https://user-images.githubusercontent.com/53982485/62827094-47487280-bbd1-11e9-845f-f7933564880…
-
Do you have any working shellcode to share?
simple code should be fine such as opening the cmd or notepad on the target server