An open API service indexing awesome lists of open source software.

https://github.com/d4t4s3c/win7blue

Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
https://github.com/d4t4s3c/win7blue

bash check checker eternalblue exploit ms17-010 netcat oscp oscp-prep oscp-tools python samba scan scanner smb vuln windows windows7

Last synced: 22 days ago
JSON representation

Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits

Awesome Lists containing this project

README

        

# Win7Blue

![GitHub stars](https://img.shields.io/github/stars/d4t4s3c/Win7Blue?logoColor=yellow) ![GitHub forks](https://img.shields.io/github/forks/d4t4s3c/Win7Blue?logoColor=purple) ![GitHub watchers](https://img.shields.io/github/watchers/d4t4s3c/Win7Blue?logoColor=green)
![GitHub commit activity (branch)](https://img.shields.io/github/commit-activity/m/d4t4s3c/Win7Blue) ![GitHub contributors](https://img.shields.io/github/contributors/d4t4s3c/Win7Blue)

Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits.

![](/screenshots/screenshot.png)

**Tested On:**
* Kali

**Requirements:**

* Nmap
* Python
* Python3
* Msfvenom
* Impacket
* Netcat/Ncat

---

# Scanner

The `Vuln` module uses **[Nmap](https://nmap.org)** to detect if the target system is vulnerable with the NSE script `smb-vuln-ms17-010`.

![](/screenshots/vuln.png)

The `Arch` module uses **[NetExec](https://www.netexec.wiki)** to identify the architecture `x86/x64` of the target system.

![](/screenshots/arch.png)

---

# Exploit

![](/screenshots/exploit.png)

---