/CVE-2024-38077-POC

原文已被作者删除,备份用,非原创,EXP & POC

Primary LanguagePython

本仓库仅用作备份,非原创,请自行测试可用性

CVE-2024-38077-EXP

【修复版,作者:qi4L】

有效范围:仅 Windows Server 2025

使用方法:

options:
  -h, --help            show this help message and exit
  --target_ip TARGET_IP
                        Target IP, eg: 192.168.120.1
  --evil_ip EVIL_IP     Evil IP, eg: 192.168.120.2
  --evil_dll_path EVIL_DLL_PATH
                        Evil dll path, eg: \smb\evil_dll.dll
  --check_vuln_exist CHECK_VULN_EXIST
                        Check vulnerability exist before exploit

https://github.com/qi4L/CVE-2024-38077

CVE-2024-38077-POC

【伪代码,作者:zhiniangpeng】

漏洞作者已经发布分析文章第一篇:https://sites.google.com/site/zhiniangpeng/blogs/MadLicense (× 已删除)

image