Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/d4t4s3c/win7blue
Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
https://github.com/d4t4s3c/win7blue
bash check checker eternalblue exploit ms17-010 netcat oscp oscp-prep oscp-tools python samba scan scanner smb vuln windows windows7
Last synced: about 1 month ago
JSON representation
Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
- Host: GitHub
- URL: https://github.com/d4t4s3c/win7blue
- Owner: d4t4s3c
- License: gpl-3.0
- Created: 2020-04-26T20:42:40.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-02-04T13:08:04.000Z (12 months ago)
- Last Synced: 2024-12-06T17:48:30.507Z (about 2 months ago)
- Topics: bash, check, checker, eternalblue, exploit, ms17-010, netcat, oscp, oscp-prep, oscp-tools, python, samba, scan, scanner, smb, vuln, windows, windows7
- Language: Python
- Homepage:
- Size: 2.28 MB
- Stars: 144
- Watchers: 2
- Forks: 19
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Win7Blue
Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits.
![](/screenshots/screenshot.png)
**Tested On:**
* Kali**Requirements:**
* Nmap
* Python
* Python3
* Msfvenom
* Impacket
* Netcat/Ncat---
# Scanner
The `Vuln` module uses **[Nmap](https://nmap.org)** to detect if the target system is vulnerable with the NSE script `smb-vuln-ms17-010`.
![](/screenshots/vuln.png)
The `Arch` module uses **[NetExec](https://www.netexec.wiki)** to identify the architecture `x86/x64` of the target system.
![](/screenshots/arch.png)
---
# Exploit
![](/screenshots/exploit.png)
---