https://github.com/d4t4s3c/win7blue
Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
https://github.com/d4t4s3c/win7blue
bash check checker eternalblue exploit ms17-010 netcat oscp oscp-prep oscp-tools python samba scan scanner smb vuln windows windows7
Last synced: 22 days ago
JSON representation
Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
- Host: GitHub
- URL: https://github.com/d4t4s3c/win7blue
- Owner: d4t4s3c
- License: gpl-3.0
- Created: 2020-04-26T20:42:40.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2025-01-28T11:25:46.000Z (3 months ago)
- Last Synced: 2025-03-29T05:04:57.675Z (30 days ago)
- Topics: bash, check, checker, eternalblue, exploit, ms17-010, netcat, oscp, oscp-prep, oscp-tools, python, samba, scan, scanner, smb, vuln, windows, windows7
- Language: Python
- Homepage:
- Size: 2.28 MB
- Stars: 154
- Watchers: 2
- Forks: 20
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Win7Blue
  
 Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits.

**Tested On:**
* Kali**Requirements:**
* Nmap
* Python
* Python3
* Msfvenom
* Impacket
* Netcat/Ncat---
# Scanner
The `Vuln` module uses **[Nmap](https://nmap.org)** to detect if the target system is vulnerable with the NSE script `smb-vuln-ms17-010`.

The `Arch` module uses **[NetExec](https://www.netexec.wiki)** to identify the architecture `x86/x64` of the target system.

---
# Exploit

---