nomisec
WORKING POC
1,348 stars
by danigargu · local
https://github.com/danigargu/CVE-2020-0796
This is a local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a compressed SMB packet to trigger an arithmetic overflow, leading to arbitrary code execution in kernel mode.
Classification
Working Poc 95%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows 10 system · SMBv3 service running
nomisec
SCANNER
713 stars
by ly4k · infoleak
https://github.com/ly4k/SMBGhost
This repository contains a Python-based scanner for CVE-2020-0796 (SMBGhost), which checks for SMBv3 compression capability in vulnerable systems. It sends a crafted SMB negotiate request and analyzes the response to determine vulnerability.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3 (10.0.0.133 and others)
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
WORKING POC
571 stars
by jamf · remote
https://github.com/jamf/CVE-2020-0796-RCE-POC
This repository contains a functional proof-of-concept exploit for CVE-2020-0796 (SMBGhost), which achieves remote code execution via a crafted SMB packet. The exploit leverages memory corruption in the SMBv3 protocol to execute arbitrary shellcode, resulting in a reverse shell with SYSTEM privileges.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 versions 1903 and 1909 (unpatched)
No auth needed
Prerequisites:
Target must be vulnerable to CVE-2020-0796 · SMBv3 protocol must be enabled · Target offsets must be calculated or known
nomisec
WORKING POC
339 stars
by Barriuso · remote
https://github.com/Barriuso/SMBGhost_AutomateExploitation
This repository contains a functional exploit for CVE-2020-0796 (SMBGhost), a remote code execution vulnerability in Microsoft SMBv3. The exploit includes kernel shellcode and a reverse shell payload, targeting vulnerable Windows systems.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (pre-patch for CVE-2020-0796)
No auth needed
Prerequisites:
Network access to target SMB service · Target system must be vulnerable to CVE-2020-0796
nomisec
WORKING POC
330 stars
by eerykitty · dos
https://github.com/eerykitty/CVE-2020-0796-PoC
This is a functional proof-of-concept exploit for CVE-2020-0796 (SMBGhost), which triggers a buffer overflow in Windows 10 1903/1909's SMB3 compression by sending a malformed compression transform header with an invalid offset value. The PoC crashes the target system by exploiting the lack of bounds checking in the decompression routine.
Classification
Working Poc 95%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
Auth required
Prerequisites:
SMB3.1.1 compression capability enabled on target · Network access to SMB port (445)
nomisec
WORKING POC
245 stars
by jamf · poc
https://github.com/jamf/CVE-2020-0796-LPE-POC
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796 (SMBGhost). The exploit leverages a kernel memory corruption vulnerability to overwrite token privileges, ultimately spawning a privileged command shell.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (affected versions prior to patch)
No auth needed
Prerequisites:
Vulnerable Windows system with SMBv3 enabled · Local access to the target system
nomisec
WORKING POC
78 stars
by Rvn0xsy · poc
https://github.com/Rvn0xsy/CVE_2020_0796_CNA
This is a reflective DLL injection PoC for CVE-2020-0796 (SMBGhost), exploiting a buffer overflow in SMBv3 compression. It includes a custom SMB negotiation and compressed packet sender to trigger the vulnerability, along with shellcode injection into winlogon.exe for privilege escalation.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909)
No auth needed
Prerequisites:
Network access to vulnerable SMBv3 server · SMBv3 compression enabled on target
nomisec
WORKING POC
71 stars
by rsmudge · remote
https://github.com/rsmudge/CVE-2020-0796-BOF
This is a functional proof-of-concept exploit for CVE-2020-0796 (SMBGhost), a local privilege escalation vulnerability in SMBv3. The code is adapted from Metasploit and converted into a Cobalt Strike Beacon Object File (BOF) for weaponization.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions affected by CVE-2020-0796)
No auth needed
Prerequisites:
Access to a vulnerable Windows system with SMBv3 enabled · Local execution context
nomisec
WORKING POC
65 stars
by jiansiting · remote
https://github.com/jiansiting/CVE-2020-0796
This PoC exploits CVE-2020-0796 (SMBGhost), a buffer overflow vulnerability in the SMBv3 compression mechanism. It sends a malformed compressed packet with an invalid offset to trigger the vulnerability, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
Microsoft Windows 10 Version 1903 and 1909, Windows Server Version 1903 and 1909
No auth needed
Prerequisites:
Network access to the target's SMB port (445)
nomisec
SCANNER
59 stars
by ioncodes · poc
https://github.com/ioncodes/SMBGhost
This repository contains a scanner for CVE-2020-0796 (SMBGhost), which checks if a target system uses SMBv3.1.1 with compression enabled. It sends a crafted SMB negotiation packet and analyzes the response to determine vulnerability status.
Classification
Scanner 100%
Target:
Microsoft Windows SMBv3.1.1 with compression enabled
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
SCANNER
51 stars
by k8gege · poc
https://github.com/k8gege/PyLadon
The repository contains a scanner tool (Ladon) with multiple modules, including a check for CVE-2018-2894 (WebLogic deserialization vulnerability). The CVE-2018-2894.py script verifies the presence of the vulnerability by checking the status code of a specific endpoint.
Classification
Scanner 90%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic server
nomisec
SCANNER
46 stars
by jamf · poc
https://github.com/jamf/SMBGhost-SMBleed-scanner
This repository contains a scanner for detecting vulnerabilities CVE-2020-0796 (SMBGhost) and CVE-2020-1206 (SMBleed) in Windows systems. The scanner sends crafted SMB packets to check for vulnerability but does not include exploit code for remote code execution.
Classification
Scanner 95%
Target:
Windows 10 version 1903 (unpatched)
No auth needed
Prerequisites:
Network access to target SMB service
nomisec
WORKING POC
33 stars
by eastmountyxz · poc
https://github.com/eastmountyxz/CVE-2020-0796-SMB
This repository contains a Python PoC for CVE-2020-0796, a vulnerability in SMBv3 compression. The exploit sends a malformed compressed packet to trigger a buffer overflow, potentially leading to remote code execution or denial of service.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909)
No auth needed
Prerequisites:
Network access to target's SMB port (445)
nomisec
SCANNER
28 stars
by T13nn3s · poc
https://github.com/T13nn3s/CVE-2020-0796
This PowerShell script checks for the presence of CVE-2020-0796 (SMBGhost) by verifying Windows version, installed updates, and SMBv3 compression settings. It also provides an option to disable SMBv3 compression as a mitigation.
Classification
Scanner 100%
Target:
Windows 10 Version 1903/1909, Windows Server Version 1903/1909 (Server Core)
Auth required
Prerequisites:
Administrator privileges · PowerShell execution policy allowing script execution
nomisec
WORKING POC
22 stars
by maxpl0it · poc
https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC
This PoC exploits CVE-2020-0796 (SMBGhost) by sending a malformed SMBv3 compression header to trigger a buffer overflow in the SMB server. It does not require authentication and is designed to crash the target system.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Network access to port 445 (SMB) on the target system
nomisec
WORKING POC
20 stars
by Almorabea · local
https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module
This is a Metasploit module for CVE-2020-0796 (SMBGhost), a local privilege escalation exploit targeting Windows 10 versions 1903-1909. It leverages a buffer overflow in SMBv3 compression to inject a DLL payload into winlogon.exe for privilege escalation.
Classification
Working Poc 95%
Target:
Windows 10 v1903-1909 x64
Auth required
Prerequisites:
Valid shell on the target system · SMBv3 compression enabled · x64 architecture
nomisec
SCANNER
19 stars
by gabimarti · poc
https://github.com/gabimarti/SMBScanner
This repository contains a multithreaded SMB scanner designed to detect CVE-2020-0796 (SMBGhost) by sending a crafted packet to SMB v3.11 servers and analyzing the response. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 95%
Target:
Microsoft Windows SMB v3.11
No auth needed
Prerequisites:
Network access to target SMB servers · SMB port (445) open and accessible
nomisec
WRITEUP
19 stars
by 0x25bit · poc
https://github.com/0x25bit/CVE-2020-0796-PoC
This repository is a writeup referencing another GitHub repository for CVE-2020-0796, a vulnerability in Microsoft SMBv3. It contains no exploit code but credits the original researchers and provides a link to their work.
Classification
Writeup 90%
Target:
Microsoft Windows SMBv3
No auth needed
nomisec
SCANNER
18 stars
by ButrintKomoni · poc
https://github.com/ButrintKomoni/cve-2020-0796
This repository contains a Python script to scan for CVE-2020-0796, a pre-authentication remote code execution vulnerability in SMBv3. The script sends a crafted SMB packet and checks the response to determine if the target is vulnerable.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 (versions prior to the March 2020 patch)
No auth needed
Prerequisites:
Network access to the target's SMB port (445)
nomisec
WORKING POC
17 stars
by f1tz · poc
https://github.com/f1tz/CVE-2020-0796-LPE-EXP
This repository contains a compiled Windows SMBv3 local privilege escalation (LPE) exploit for CVE-2020-0796, derived from a source project. It includes a pre-compiled x64 binary tested on Windows 10 1909.
Classification
Working Poc 90%
Target:
Windows SMBv3 (Windows 10 1909)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Compiled exploit binary
nomisec
SCANNER
16 stars
by GuoKerS · poc
https://github.com/GuoKerS/aioScan_CVE-2020-0796
This repository contains a Python-based scanner for CVE-2020-0796 (SMBGhost), leveraging asyncio for high-speed network scanning. It checks for vulnerability by sending a crafted SMB packet and analyzing the response.
Classification
Scanner 95%
Target:
Windows 10 Version 1903/1909 and Windows Server Version 1903/1909 (SMBv3)
No auth needed
Prerequisites:
Network access to target systems on port 445 (SMB) · Python 3.7+ with netaddr library
nomisec
SCANNER
15 stars
by w1ld3r · poc
https://github.com/w1ld3r/SMBGhost_Scanner
This repository contains a scanner for CVE-2020-0796 (SMBGhost), which detects vulnerable systems by sending a crafted SMB packet and checking the response. It supports mass scanning and Shodan integration for additional target information.
Classification
Scanner 100%
Target:
Microsoft Windows SMBv3 (versions affected by CVE-2020-0796)
No auth needed
Prerequisites:
Python 3 · masscan · Shodan API key (optional)
nomisec
SCANNER
14 stars
by dickens88 · poc
https://github.com/dickens88/cve-2020-0796-scanner
This repository contains a Python-based scanner for CVE-2020-0796 (SMBGhost), which checks for the SMBv3 RCE vulnerability by sending a crafted packet and analyzing the response. It does not include an exploit payload but confirms vulnerability status.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
SCANNER
14 stars
by joaozietolie · poc
https://github.com/joaozietolie/CVE-2020-0796-Checker
This repository contains a bash script that checks if a target system is vulnerable to CVE-2020-0796 by detecting SMB v3.11 using nmap. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 100%
Target:
Microsoft Windows SMBv3 (versions with CVE-2020-0796)
No auth needed
Prerequisites:
nmap installed · network access to target port 445
nomisec
WORKING POC
11 stars
by thelostworldFree · poc
https://github.com/thelostworldFree/CVE-2020-0796
This is a Python-based exploit PoC for CVE-2020-0796, a vulnerability in Microsoft SMBv3. It attempts to achieve remote code execution (RCE) by sending a crafted payload to establish a reverse shell.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (CVE-2020-0796)
No auth needed
Prerequisites:
Network access to target SMBv3 service · Python 2.7 environment
nomisec
SCANNER
9 stars
by jiansiting · poc
https://github.com/jiansiting/CVE-2020-0796-Scanner
This is a scanner for CVE-2020-0796 (SMBGhost) that checks for SMBv3.1.1 dialect and compression capability by sending a crafted SMB negotiate request. It does not exploit the vulnerability but identifies potentially vulnerable systems.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3.1.1 (pre-patch)
No auth needed
Prerequisites:
Network access to target systems on port 445
nomisec
WRITEUP
9 stars
by technion · poc
https://github.com/technion/DisableSMBCompression
This repository provides ADMX templates for mitigating CVE-2020-0796 by disabling SMB compression via a registry setting. It includes installation instructions and applicability guidance but does not contain exploit code.
Classification
Writeup 100%
Target:
Windows 10 and Windows Server 2019 (SAC builds)
Auth required
Prerequisites:
Administrative access to deploy ADMX templates · Active Directory environment for mass deployment
nomisec
WRITEUP
6 stars
by dungnm24 · dos
https://github.com/dungnm24/CVE-2020-0796
The repository contains Microsoft's Windows Protocol Test Suites and related scripts, but no actual exploit code for CVE-2020-0796. The README references an external link for details on the vulnerability.
Classification
Writeup 90%
Target:
Microsoft Windows SMBv3
No auth needed
Prerequisites:
Access to vulnerable SMBv3 server
nomisec
WORKING POC
6 stars
by 0xeb-bp · local
https://github.com/0xeb-bp/cve-2020-0796
This is a Rust-based exploit for CVE-2020-0796 (SMBGhost), a local privilege escalation vulnerability in Windows SMBv3. The PoC leverages a compression buffer overflow to overwrite kernel memory and escalate privileges.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and 2004)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 enabled
nomisec
WRITEUP
5 stars
by vysecurity · poc
https://github.com/vysecurity/CVE-2020-0796
This repository contains only a README file with minimal information about CVE-2020-0796, authored by Vincent Yiu. No exploit code or technical details are provided.
Classification
Writeup 90%
Target:
Microsoft Windows SMBv3 (unknown version)
No auth needed
Prerequisites:
none
nomisec
WORKING POC
5 stars
by orangmuda · local
https://github.com/orangmuda/CVE-2020-0796
This repository contains a proof-of-concept exploit for CVE-2020-0796 (SMBGhost), a remote code execution vulnerability in Windows 10 SMBv3. The exploit uses a kernel shellcode to achieve RCE by targeting vulnerable Windows 10 versions (1903/1909) and requires manual offset calculation for reliability.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 (1903, 1909) SMBv3
No auth needed
Prerequisites:
Target must be running vulnerable Windows 10 version · Manual offset calculation via calc_target_offsets.bat · Network access to SMB port (445)
github
WORKING POC
5 stars
by dacade · pythonpoc
https://github.com/dacade/CVE-POC/tree/master/CVE-2020-0796
This repository contains a functional exploit for CVE-2020-0796 (SMBGhost), a remote code execution vulnerability in the Windows SMBv3 protocol. The exploit includes kernel shellcode and a reverse shell payload, demonstrating the vulnerability's exploitation via crafted SMB packets.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 Version 1903 and 1909 (SMBv3)
No auth needed
Prerequisites:
Network access to target SMB server · SMBv3 compression enabled on target
nomisec
STUB
4 stars
by tango-j · poc
https://github.com/tango-j/CVE-2020-0796
The repository contains only a README.md file with minimal information about CVE-2020-0796, referencing a compiled exploit without providing any actual code or technical details. No exploit logic or proof-of-concept is included.
Target:
Microsoft Windows SMBv3 (CVE-2020-0796)
No auth needed
Prerequisites:
Compiled binary from external source
nomisec
SCANNER
4 stars
by wneessen · poc
https://github.com/wneessen/SMBCompScan
This Perl script scans for hosts vulnerable to CVE-2020-0796 by checking if SMBv3 compression is enabled. It sends a crafted SMB packet and analyzes the response to determine vulnerability status.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3 (pre-KB4551762)
No auth needed
Prerequisites:
Network access to target SMB port (445/TCP) · SMB service exposed and reachable
nomisec
WRITEUP
3 stars
by sujitawake · poc
https://github.com/sujitawake/smbghost
This repository contains PCAP files demonstrating the SMBGhost (CVE-2020-0796) vulnerability, including crash and scanning artifacts for Windows 7 and Windows 10. It does not include executable exploit code but provides network traffic captures for analysis.
Classification
Writeup 90%
Target:
Microsoft Windows SMBv3 (Windows 10 1903-1909, Windows Server 1903-1909)
No auth needed
Prerequisites:
Network access to target SMBv3 service · Ability to send crafted SMB packets
nomisec
STUB
3 stars
by exp-sky · poc
https://github.com/exp-sky/CVE-2020-0796
The repository contains only a README.md file with a title and a reference to a demo video for CVE-2020-0796 (SMBv3 Ghost vulnerability). No exploit code or technical details are provided.
Target:
Microsoft Windows SMBv3
No auth needed
Prerequisites:
none provided
nomisec
WRITEUP
2 stars
by DannyRavi · poc
https://github.com/DannyRavi/nmap-scripts
This repository contains a README describing multiple CVEs, including CVE-2020-0796 (SMBv3 RCE), but does not include actual exploit code or Nmap scripts. It serves as a high-level overview of vulnerabilities without functional PoC.
Classification
Writeup 90%
Target:
Microsoft SMBv3, Sonatype Nexus, Atlassian Crowd, Symantec Messaging Gateway
No auth needed
Prerequisites:
none
nomisec
WORKING POC
2 stars
by MasterSploit · local
https://github.com/MasterSploit/LPE---CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, leveraging a write-what-where vulnerability in the Windows SMBv3 protocol. The exploit manipulates kernel memory to escalate privileges and spawns a command shell via DLL injection into winlogon.exe.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions affected by CVE-2020-0796)
No auth needed
Prerequisites:
Vulnerable Windows system with SMBv3 enabled · Local access to the target system
nomisec
WORKING POC
2 stars
by codewithpradhan · dos
https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-
This PoC exploits CVE-2020-0796 (SMBGhost), a buffer overflow vulnerability in the SMBv3 compression mechanism. It sends a malformed compressed packet with an invalid offset to trigger the vulnerability, potentially leading to a denial-of-service or remote code execution on unpatched systems.
Classification
Working Poc 90%
Target:
Microsoft Windows 10 Version 1903 and 1909, Windows Server Version 1903 and 1909
No auth needed
Prerequisites:
Network access to target's SMB port (445) · Target system with vulnerable SMBv3 implementation
nomisec
SCANNER
2 stars
by Anonimo501 · remote
https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker
This repository contains a Python-based scanner for CVE-2020-0796 (SMBGhost), which checks for SMBv3 compression capability in negotiate requests to determine vulnerability. It sends a crafted packet and analyzes the response to identify vulnerable systems.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 (10.0.0.133 and similar versions)
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
WRITEUP
2 stars
by TinToSer · poc
https://github.com/TinToSer/CVE-2020-0796-LPE
This repository is a README file referencing external GitHub repositories for CVE-2020-0796, a local privilege escalation vulnerability in SMBv3 (SMBGhost). It does not contain exploit code itself but points to PoCs developed by ZecOps and danigargu.
Classification
Writeup 90%
Target:
Microsoft Windows SMBv3 (versions prior to patch)
No auth needed
Prerequisites:
Vulnerable Windows system with SMBv3 compression enabled
nomisec
WRITEUP
2 stars
by laolisafe · poc
https://github.com/laolisafe/CVE-2020-0796
This repository contains a README file describing CVE-2020-0796, an SMBv3 RCE vulnerability affecting Windows 10. It includes images showing vulnerability status and a link to a detection script but lacks actual exploit code.
Classification
Writeup 80%
Target:
Microsoft Windows 10 (SMBv3)
No auth needed
Prerequisites:
Network access to vulnerable SMBv3 service
nomisec
WORKING POC
1 stars
by OldDream666 · remote
https://github.com/OldDream666/cve-2020-0796
This repository contains a functional exploit for CVE-2020-0796 (SMBGhost), a vulnerability in the SMBv3 protocol. The exploit includes kernel shellcode and a reverse shell payload, targeting Windows systems via a buffer overflow in SMB compression.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 Version 1903/1909 (SMBv3)
No auth needed
Prerequisites:
Network access to target SMB server · SMBv3 compression enabled on target
nomisec
SCANNER
1 stars
by BinaryShadow94 · poc
https://github.com/BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796
This repository contains a Python script that scans for systems potentially vulnerable to CVE-2020-0796 by checking if they support SMBv3.1.1 with compression algorithms. It sends a crafted SMB packet and analyzes the response to determine vulnerability status.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3.1.1
No auth needed
Prerequisites:
Network access to target systems on port 445 (SMB)
nomisec
SCANNER
1 stars
by netscylla · poc
https://github.com/netscylla/SMBGhost
This repository contains a threaded scanner for CVE-2020-0796 (SMBGhost), which checks for SMBv3 vulnerability by sending a crafted packet and analyzing the response. It does not include an exploit payload, only detection logic.
Classification
Scanner 100%
Target:
Microsoft Windows SMBv3 (10.0.0.133 and others)
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
WRITEUP
1 stars
by arzuozkan · poc
https://github.com/arzuozkan/CVE-2020-0796
This repository is a writeup explaining CVE-2020-0796, a remote code execution vulnerability in Microsoft SMBv3. It provides references, PoC links, and general exploitation steps but does not contain actual exploit code.
Classification
Writeup 90%
Target:
Microsoft Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Network access to target SMB server · Target system running vulnerable SMBv3 version
nomisec
SCANNER
1 stars
by AdamSonov · poc
https://github.com/AdamSonov/smbGhostCVE-2020-0796
This repository contains a scanner for CVE-2020-0796 (SMBGhost), which checks for vulnerability in SMBv3 compression. It sends a crafted packet and analyzes the response to determine if the target is vulnerable.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Network access to target's SMB port (445)
nomisec
WRITEUP
1 stars
by SEHandler · poc
https://github.com/SEHandler/CVE-2020-0796
This repository is a README file that aggregates links to other PoC repositories for CVE-2020-0796, a critical SMBv3 vulnerability. It does not contain exploit code itself but references external sources for scanners and exploits.
Classification
Writeup 90%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909)
No auth needed
Prerequisites:
Network access to vulnerable SMBv3 server
nomisec
WORKING POC
1 stars
by bsec404 · poc
https://github.com/bsec404/CVE-2020-0796
This PoC exploits CVE-2020-0796 (SMBGhost) by sending a malformed SMBv3 compression header with an invalid offset, triggering a buffer overflow in vulnerable Windows systems. It includes SMB2 protocol handling and NetBIOS wrapping for packet transmission.
Classification
Working Poc 90%
Target:
Microsoft Windows 10 Version 1903/1909, Windows Server Version 1903/1909
No auth needed
Prerequisites:
Network access to target's SMB port (445) · Vulnerable SMBv3 implementation
nomisec
SCANNER
1 stars
by julixsalas · infoleak
https://github.com/julixsalas/CVE-2020-0796
This is a Metasploit auxiliary module designed to scan for CVE-2020-0796, a vulnerability in SMBv3. It sends a crafted packet to the target and checks the response to determine if the system is vulnerable.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 (versions prior to the patch for CVE-2020-0796)
No auth needed
Prerequisites:
Network access to the target system on port 445
nomisec
WORKING POC
1 stars
by LabDookhtegan · poc
https://github.com/LabDookhtegan/CVE-2020-0796-EXP
This repository contains a Windows SMBv3 local privilege escalation (LPE) exploit for CVE-2020-0796. The exploit allows command execution via a provided IP and command-line argument.
Classification
Working Poc 80%
Target:
Windows SMBv3 (Server Message Block 3.1.1)
No auth needed
Prerequisites:
Access to a vulnerable Windows system with SMBv3 enabled · Network connectivity to the target
nomisec
WRITEUP
1 stars
by datntsec · local
https://github.com/datntsec/CVE-2020-0796
This repository contains a detailed technical analysis of CVE-2020-0796, focusing on the integer overflow vulnerability in the SMBv3 compression feature. It explains the exploit mechanism for Local Privilege Escalation (LPE) but does not include functional exploit code.
Classification
Writeup 90%
Target:
Windows 10 Version 1903/1909 and Windows Server Version 1903/1909
No auth needed
Prerequisites:
Access to a vulnerable Windows system with SMBv3 compression enabled
nomisec
SCANNER
1 stars
by 1stPeak · poc
https://github.com/1stPeak/CVE-2020-0796-Scanner
This repository contains a scanner for CVE-2020-0796, a vulnerability in Microsoft SMBv3. The scanner is sourced from Qi'anxin and is designed to detect the presence of the vulnerability.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3
No auth needed
Prerequisites:
Network access to the target system
nomisec
WORKING POC
1 stars
by cybermads · poc
https://github.com/cybermads/CVE-2020-0796
This PoC exploits CVE-2020-0796 (SMBGhost), an integer overflow vulnerability in SMBv3 compression, by sending a malformed packet with an invalid offset to trigger a buffer overflow, potentially causing a Blue Screen of Death (BSOD) on Windows 10 1903.
Classification
Working Poc 95%
Target:
Windows 10 1903 (SMBv3)
No auth needed
Prerequisites:
Network access to target SMB port (typically 445)
nomisec
WORKING POC
1 stars
by ran-sama · dos
https://github.com/ran-sama/CVE-2020-0796
This repository contains a Python-based PoC and scanner for CVE-2020-0796, a vulnerability in SMBv3.1.1 compression. It detects the SMB version and compression type, and can optionally send a malformed packet to trigger a crash (DoS).
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3.1.1
No auth needed
Prerequisites:
Network access to target SMB port (445) · Target system running vulnerable SMBv3.1.1
nomisec
SCANNER
1 stars
by awareseven · poc
https://github.com/awareseven/eternalghosttest
This repository contains a Python script that checks for the presence of CVE-2020-0796 by verifying if a target system uses SMBv3.1.1 with compression enabled. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 100%
Target:
Windows 10 Version 1903/1909, Windows Server Version 1903/1909
No auth needed
Prerequisites:
Network access to TCP port 445 on the target system
nomisec
WORKING POC
1 stars
by cory-zajicek · poc
https://github.com/cory-zajicek/CVE-2020-0796-DoS
This PoC exploits CVE-2020-0796 (SMBGhost) to trigger a denial-of-service (BSoD) on vulnerable Windows systems via a malformed SMB packet. It sends a crafted SMB request to port 445, causing a buffer overflow in the SMBv3 compression mechanism.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 Version 1903/1909, Windows Server Version 1903/1909
No auth needed
Prerequisites:
Network access to target's SMB port (445) · Vulnerable SMBv3 implementation
nomisec
SCANNER
1 stars
by Dhoomralochana · poc
https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-Testing
This repository is a curated list of scanners and detection tools for CVE-2020-0796, a critical RCE vulnerability in Microsoft Windows SMBv3. It provides references to various GitHub repositories and tools for identifying vulnerable systems.
Classification
Scanner 100%
Target:
Microsoft Windows SMBv3
No auth needed
Prerequisites:
Access to the target network · SMBv3 enabled on the target system
nomisec
SCANNER
1 stars
by F6JO · poc
https://github.com/F6JO/CVE-2020-0796-Batch-scanning
This repository contains a Python script that automates batch scanning for CVE-2020-0796 using a third-party scanner (CVE-2020-0796-Scanner.exe). It reads IPs from a file and uses multithreading to execute the scanner for each IP.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 (CVE-2020-0796)
No auth needed
Prerequisites:
CVE-2020-0796-Scanner.exe · list of target IPs in a text file
nomisec
SCANNER
by nyambiblaise · poc
https://github.com/nyambiblaise/Microsoft-Windows-SMBGhost-Vulnerability-Checker---CVE-2020-0796---SMBv3-RCE
This repository contains a Python script that checks for the presence of CVE-2020-0796 (SMBGhost) by sending a crafted SMB negotiate request to detect vulnerable SMBv3.1.1 servers with compression capability. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3.1.1
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
WRITEUP
by wsfengfan · poc
https://github.com/wsfengfan/CVE-2020-0796
This repository is a README file referencing a Python PoC for CVE-2020-0796, a buffer overflow vulnerability. It links to another GitHub repository for the actual exploit code.
Classification
Writeup 80%
Target:
Microsoft Windows SMBv3
No auth needed
Prerequisites:
Network access to a vulnerable SMBv3 server
nomisec
STUB
by tripledd · poc
https://github.com/tripledd/cve-2020-0796-vuln
The repository contains only a README file with minimal information about CVE-2020-0796, lacking any actual exploit code or technical details. It appears to be a placeholder or incomplete submission.
Target:
Microsoft Windows SMBv3 (CVE-2020-0796)
No auth needed
nomisec
WORKING POC
by AaronCaiii · remote
https://github.com/AaronCaiii/CVE-2020-0796-POC
This repository contains a PoC and a scanner for CVE-2020-0796, a vulnerability in SMBv3 compression. The PoC sends a malformed compressed packet to trigger the vulnerability, while the scanner checks for vulnerable systems by analyzing the SMB response.
Classification
Working Poc | Scanner 90%
Target:
Microsoft Windows 10 Version 1903 and later, Windows Server Version 1903 and later
No auth needed
Prerequisites:
Network access to the target's SMB port (445)
nomisec
SCANNER
by kn6869610 · poc
https://github.com/kn6869610/CVE-2020-0796
This repository contains a scanner for CVE-2020-0796 (SMBGhost), which checks for SMB dialect 3.1.1 and compression capability through a negotiate request. It does not include an exploit but verifies vulnerability by analyzing the SMB response.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 Server
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
SCANNER
by UraSecTeam · poc
https://github.com/UraSecTeam/smbee
This repository contains a Go-based scanner to check if a system is vulnerable to CVE-2020-0796, a vulnerability in SMB v3. It does not include exploit code but serves as a detection tool.
Classification
Scanner 90%
Target:
Microsoft Windows SMB v3
No auth needed
Prerequisites:
Network access to target SMB service
nomisec
WORKING POC
by Opensitoo · poc
https://github.com/Opensitoo/cve-2020-0796
This repository contains a PoC and scanner for CVE-2020-0796 (SMBGhost), a vulnerability in SMBv3 protocol. The PoC sends malformed SMB packets to trigger a buffer overflow, while the scanner checks for vulnerability by analyzing SMB negotiation responses.
Classification
Working Poc | Scanner 90%
Attack Type
Dos | Info Leak
Target:
Microsoft Windows SMBv3 (versions 1903, 1909)
No auth needed
Prerequisites:
Network access to target's SMB port (445) · Target system running vulnerable SMBv3 version
nomisec
WRITEUP
by z3ena · poc
https://github.com/z3ena/Exploiting-and-Mitigating-CVE-2020-0796-SMBGhost-and-Print-Spooler-Vulnerabilities
This repository provides a detailed writeup and documentation on exploiting and mitigating CVE-2020-0796 (SMBGhost) and Print Spooler vulnerabilities, including analysis, detection techniques, and mitigation steps. It does not contain actual exploit code but serves as a guide for setting up a virtualized environment for testing.
Classification
Writeup 90%
Target:
Microsoft Windows SMBv3 (CVE-2020-0796) and Print Spooler
No auth needed
Prerequisites:
VirtualBox setup · Vulnerable Windows system for testing
gitlab
WORKING POC
by gavz · poc
https://gitlab.com/gavz/CVE-2020-0796-POC
This repository contains functional PowerShell scripts designed to exploit CVE-2020-0796, a vulnerability in the SMBv3 protocol. The scripts include various post-exploitation actions such as adding users to local groups, creating DFS folders, and adding printers, indicating a working proof-of-concept for privilege escalation or lateral movement.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (Server Message Block 3.1.1)
No auth needed
Prerequisites:
Network access to a vulnerable SMBv3 server · SMBv3 compression enabled on the target
gitlab
WORKING POC
by darthploit · poc
https://gitlab.com/darthploit/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with a compressed data field to trigger an arithmetic overflow, leading to arbitrary code execution in the context of the winlogon.exe process.
Classification
Working Poc 95%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 compression enabled
gitlab
SCANNER
by mrlayle · poc
https://gitlab.com/mrlayle/SMBGhost
This repository contains a scanner script that detects whether a server uses SMBv3.1.1 with SMB compression enabled, indicating vulnerability to CVE-2020-0796. It does not exploit the vulnerability but provides detailed packet structures for further SMB protocol investigations.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3.1.1
No auth needed
Prerequisites:
Network access to the target SMB server
gitlab
WORKING POC
by vanlam2001 · poc
https://gitlab.com/vanlam2001/cve-2020-0796
This repository contains a functional exploit for CVE-2020-0796, a vulnerability in SMBv3 compression. The PoC includes a scanner to detect vulnerable systems and an exploit that triggers the vulnerability by sending a malformed compressed SMB packet.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Network access to port 445 (SMB) · Target system must have SMBv3 compression enabled
gitlab
WORKING POC
by darthploit · poc
https://gitlab.com/darthploit/CVE-2020-0796-POC
This repository contains functional PowerShell scripts designed to exploit CVE-2020-0796, a vulnerability in the SMBv3 protocol. The scripts include various post-exploitation actions such as adding users to local groups, creating DFS folders, and configuring system settings, indicating a working proof-of-concept for privilege escalation or lateral movement.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (Server Message Block 3.1.1)
No auth needed
Prerequisites:
Network access to a vulnerable SMBv3 server · SMBv3 compression enabled on the target
nomisec
STUB
by ysyyrps123 · remote
https://github.com/ysyyrps123/CVE-2020-0796-exp
The repository contains only a README.md file with minimal content, providing no functional exploit code or technical details for CVE-2020-0796.
Target:
Microsoft Windows SMBv3 (CVE-2020-0796)
No auth needed
nomisec
WORKING POC
by Murasame-nc · local
https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC
This is a proof-of-concept exploit for CVE-2020-0796, a local privilege escalation vulnerability in Windows SMBv3. The exploit leverages a buffer overflow in the SMB compression mechanism to overwrite kernel memory and escalate privileges.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (affected versions include Windows 10 1903, 1909, and Windows Server 1903, 1909)
No auth needed
Prerequisites:
Local access to the target system · SMBv3 enabled on the target system
nomisec
WORKING POC
by lisinan988 · remote
https://github.com/lisinan988/CVE-2020-0796-exp
This repository contains a functional exploit for CVE-2020-0796 (SMBGhost), a remote code execution vulnerability in the Windows SMBv3 protocol. The exploit leverages a buffer overflow in the SMB compression mechanism to achieve arbitrary kernel code execution.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 Version 1903/1909 (SMBv3)
No auth needed
Prerequisites:
Network access to target SMB server · Target system must be vulnerable (unpatched Windows 10 1903/1909)
nomisec
WRITEUP
by hungdnvp · dos
https://github.com/hungdnvp/POC-CVE-2020-0796
This repository provides a detailed writeup on exploiting CVE-2020-0796 (SMBGhost), including reconnaissance steps using Nmap and references to external exploit scripts. It does not contain direct exploit code but guides users through the process of identifying and exploiting the vulnerability.
Classification
Writeup 90%
Target:
Windows 10 Version 1903/1909, Windows Server 1903/1909
No auth needed
Prerequisites:
Network access to target · SMB port (445) open · Vulnerable SMBv3.1.1 implementation
nomisec
WORKING POC
by monjheta · remote
https://github.com/monjheta/CVE-2020-0796
This is a functional PoC for CVE-2020-0796 (SMBGhost), a remote code execution vulnerability in Windows 10 SMBv3. It exploits a buffer overflow to achieve a reverse shell with SYSTEM privileges, leveraging SMBleed (CVE-2020-1206) for memory read primitives.
Classification
Working Poc 95%
Target:
Windows 10 versions 1903 and 1909 (SMBv3)
No auth needed
Prerequisites:
Target must be running vulnerable Windows 10 version · SMBv3 compression enabled · Manual offset calculation for target system
nomisec
STUB
by krizzz07 · poc
https://github.com/krizzz07/CVE-2020-0796
The repository contains only a README.md file with minimal information about CVE-2020-0796, a Windows 10 SMB vulnerability, but no actual exploit code or technical details.
Target:
Windows 10 SMB
No auth needed
nomisec
SCANNER
by Almorabea · poc
https://github.com/Almorabea/SMBGhost-WorkaroundApplier
This repository contains a Python script to detect and apply a workaround for CVE-2020-0796 (SMBGhost), an unauthenticated RCE vulnerability in SMBv3. It checks the Windows registry for the 'DisableCompression' setting and applies the fix if the system is vulnerable.
Classification
Scanner 100%
Target:
Microsoft Windows 10 Version 1903/1909, Windows Server Version 1903/1909
Auth required
Prerequisites:
Administrator privileges · Windows system with SMBv3 enabled
nomisec
WORKING POC
by halsten · poc
https://github.com/halsten/CVE-2020-0796
This is a local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a compressed packet with an arithmetic overflow to achieve arbitrary code execution in the context of the winlogon.exe process.
Classification
Working Poc 95%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows 10 system with SMBv3 enabled
nomisec
WORKING POC
by tdevworks · poc
https://github.com/tdevworks/CVE-2020-0796-SMBGhost-Exploit-Demo
This repository provides a proof-of-concept exploit for CVE-2020-0796 (SMBGhost), a critical pre-auth RCE vulnerability in Windows 10 and Windows Server systems using SMBv3. The PoC leverages memory corruption to achieve remote code execution with system-level privileges.
Classification
Working Poc 95%
Target:
Windows 10 version 1903 (Build 18362.356) and Windows Server with SMBv3
No auth needed
Prerequisites:
Target machine with vulnerable SMBv3 implementation · Attacker machine with Python 3.x and Netcat · Memory offset calculation script for target system
nomisec
WORKING POC
by maqeel-git · poc
https://github.com/maqeel-git/CVE-2020-0796
This repository contains a proof-of-concept exploit for CVE-2020-0796, a critical vulnerability in the SMBv3 protocol. The exploit includes payload generation, a scanner, and crash test utilities, targeting the 'SMBGhost' vulnerability for potential remote code execution.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Network access to the target system · SMBv3 protocol enabled on the target
nomisec
WRITEUP
by vsai94 · poc
https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-
This repository provides a detailed technical writeup on CVE-2020-0796 (SMBGhost), including the vulnerability's root cause (integer overflow in Srv2DecompressData), affected Windows versions, and a step-by-step attack scenario. It includes network scanning and exploitation steps but lacks actual exploit code.
Classification
Writeup 90%
Target:
Windows 10 version 1903 with SMBv3 enabled
No auth needed
Prerequisites:
Network access to target · SMB port (445) open · SMBv3 enabled on target
nomisec
SCANNER
by xax007 · poc
https://github.com/xax007/CVE-2020-0796-Scanner
This repository contains a Python script that scans for CVE-2020-0796 (SMBGhost) by sending an SMB negotiate request and checking the response for vulnerable compression algorithms. It does not exploit the vulnerability but detects its presence.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3.1.1
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
SCANNER
by intelliroot-tech · poc
https://github.com/intelliroot-tech/cve-2020-0796-Scanner
This script scans for CVE-2020-0796 (SMBv3 vulnerability) by sending a crafted packet and checking the response. It supports single IP or subnet scanning with multithreading.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Network access to target SMB port (445)
nomisec
SCANNER
by bacth0san96 · poc
https://github.com/bacth0san96/SMBGhostScanner
This repository contains a bash script that scans for SMB v3.11 to identify potential vulnerability to CVE-2020-0796. It uses nmap to check the SMB protocol version on a target IP.
Classification
Scanner 90%
Target:
Microsoft Windows SMB v3.11
No auth needed
Prerequisites:
nmap installed · target IP address
nomisec
SCANNER
by 1060275195 · poc
https://github.com/1060275195/SMBGhost
This repository contains a scanner for CVE-2020-0796 (SMBGhost), which checks for vulnerability in SMBv3 by sending a crafted packet and analyzing the response. It does not include an exploit for RCE but confirms the presence of the vulnerability.
Classification
Scanner 90%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909)
No auth needed
Prerequisites:
Network access to target's SMB port (445) · Target running vulnerable SMBv3 version
exploitdb
WORKING POC
by chompie1337 · pythonremotewindows
https://www.exploit-db.com/exploits/48537
This is a proof-of-concept exploit for CVE-2020-0796 (SMBGhost), a pre-authentication remote code execution vulnerability in the Windows SMBv3 protocol. The exploit leverages a buffer overflow in the SRVNET_BUFFER_HDR structure to achieve arbitrary code execution in kernel mode.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 Version 1903/1909 (SMBv3)
No auth needed
Prerequisites:
Network access to target SMB server · Target system must be vulnerable (unpatched Windows 10 1903/1909)
patchapalooza
WORKING POC
by mstir · poc
https://gitee.com/mstir/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with a compressed data field to trigger an integer overflow, leading to arbitrary code execution in the context of the winlogon.exe process.
Classification
Working Poc 95%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 compression enabled
patchapalooza
WORKING POC
by keepb1ue · poc
https://gitee.com/keepb1ue/CVE-2020-0796-PoC
This repository contains a functional PoC for CVE-2020-0796 (SMBGhost), which exploits a buffer overflow in Windows 10 1903/1909's SMB3 compression by setting an invalid offset in the compression transform header. The exploit crashes the target system by triggering a kernel buffer overflow during decompression.
Classification
Working Poc 95%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
No auth needed
Prerequisites:
SMB3.1.1 compression capability negotiated · Target system vulnerable to CVE-2020-0796
patchapalooza
WORKING POC
by tfxcould · poc
https://gitee.com/tfxcould/CVE-2020-0796-SMB
The repository contains a functional Python PoC for CVE-2020-0796, which exploits a buffer overflow vulnerability in the SMBv3 protocol. The code crafts malicious SMB packets with a compressed transform header to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and 2004)
No auth needed
Prerequisites:
Network access to target SMB port (445)
patchapalooza
WORKING POC
by quan2020 · poc
https://gitee.com/quan2020/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a compressed SMB packet to trigger an arithmetic overflow, leading to privilege escalation.
Classification
Working Poc 100%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 compression enabled
patchapalooza
SCANNER
by mstir · poc
https://gitee.com/mstir/SMBGhost
The repository contains a Python-based scanner for CVE-2020-0796 (SMBGhost) that checks for SMBv3.1.1 dialect and compression capability via a negotiate request. It does not include exploit code but confirms vulnerability by analyzing the server's response.
Classification
Scanner 100%
Target:
Microsoft Windows SMBv3 (10.0.0.133 and others)
No auth needed
Prerequisites:
network access to SMB port (445)
patchapalooza
WORKING POC
by yoghourt010 · poc
https://gitee.com/yoghourt010/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with a compressed data field to trigger an arithmetic overflow, leading to arbitrary code execution.
Classification
Working Poc 100%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 compression enabled
patchapalooza
WORKING POC
by jerry1029 · poc
https://gitee.com/jerry1029/CVE-2020-0796-PoC
This repository contains a functional PoC for CVE-2020-0796 (SMBGhost), which exploits a buffer overflow in Windows 10 1903/1909's SMB3 compression by setting an invalid offset in the compression transform header. The exploit crashes the target system by triggering a kernel buffer overflow during decompression.
Classification
Working Poc 95%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
No auth needed
Prerequisites:
SMB3.1.1 compression capability negotiated · Target system running vulnerable Windows 10 version
patchapalooza
SCANNER
by keepb1ue · poc
https://gitee.com/keepb1ue/cve-2020-0797
The repository contains a Python script and a Bash script designed to scan for the presence of CVE-2020-0796, a vulnerability in SMBv3.1.1. The scripts check for specific responses from the target system to determine if it is vulnerable.
Classification
Scanner 90%
Target:
Microsoft Windows 10 Version 1903/1909, Windows Server Version 1903/1909
No auth needed
Prerequisites:
Network access to port 445 on the target system
patchapalooza
WORKING POC
by mirrors_eerykitty · poc
https://gitee.com/mirrors_eerykitty/CVE-2020-0796-PoC
This repository contains a functional PoC for CVE-2020-0796 (SMBGhost), which exploits a buffer overflow in Windows 10 1903/1909's SMB3 compression by setting an invalid offset in the compression transform header. The exploit crashes the target system by triggering a kernel buffer overflow during decompression.
Classification
Working Poc 95%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
No auth needed
Prerequisites:
SMB3.1.1 compression capability negotiated · Target system vulnerable to CVE-2020-0796
exploitdb
SUSPICIOUS
by Daniel García Gutiérrez · textlocalwindows
https://www.exploit-db.com/exploits/48267
The provided content lacks actual exploit code and instead directs users to an external download link. It includes references and a GIF but no technical details or functional PoC.
Classification
Suspicious 90%
Target:
Windows SMBv3
No auth needed
Prerequisites:
Vulnerable Windows SMBv3 implementation
patchapalooza
WORKING POC
by li-yuemin-95 · poc
https://gitee.com/li-yuemin-95/CVE-2020-0796-PoC
This repository contains a functional PoC for CVE-2020-0796 (SMBGhost), which exploits a buffer overflow in Windows 10 1903/1909's SMB3 compression by setting an invalid offset in the compression transform header. The exploit crashes the target system by triggering a kernel buffer overflow during decompression.
Classification
Working Poc 95%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
No auth needed
Prerequisites:
SMB3.1.1 compression capability negotiated · Target system vulnerable to CVE-2020-0796
patchapalooza
WORKING POC
by shamorkFu · poc
https://gitee.com/shamorkFu/SMBGhost_Crash_Poc
This repository contains a functional Python exploit for CVE-2020-0796 (SMBGhost), which triggers a Blue Screen of Death (BSOD) on vulnerable Windows 10 systems by sending a malformed SMBv3 compression packet. The PoC leverages the Impacket library to craft and send the exploit packet.
Classification
Working Poc 95%
Target:
Windows 10 (1903 and earlier)
No auth needed
Prerequisites:
Impacket library installed from source · Network access to target SMB port (445)
patchapalooza
SCANNER
by llsw · poc
https://gitee.com/llsw/SMBGhost
This repository contains a Python-based scanner for CVE-2020-0796 (SMBGhost), which checks for SMBv3.1.1 dialect and compression capability to determine vulnerability. It does not include exploit code but provides a network-based detection method.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3 (10.0.0.133 and others)
No auth needed
Prerequisites:
Network access to target SMB port (445)
patchapalooza
WORKING POC
by xiaobaiyimei0 · poc
https://gitee.com/xiaobaiyimei0/CVE-2020-0796-PoC
This repository contains a functional PoC for CVE-2020-0796 (SMBGhost), which exploits a buffer overflow in Windows 10 1903/1909's SMB3 compression capability by sending a crafted SMB packet with a malformed compression transform header. The exploit triggers a kernel crash due to lack of bounds checking on the offset field in the decompression routine.
Classification
Working Poc 95%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
No auth needed
Prerequisites:
SMB3.1.1 compression capability negotiated · Network access to target SMB server
metasploit
WORKING POC
NORMAL
by hugeh0ge, chompie1337, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/cve_2020_0796_smbghost.rb
This Metasploit module exploits CVE-2020-0796, a buffer overflow in the SMBv3 protocol, to achieve remote code execution (RCE) on vulnerable Windows systems. It leverages memory corruption techniques to execute arbitrary code in the kernel context, ultimately yielding a SYSTEM-level session.
Classification
Working Poc 100%
Target:
Microsoft Windows 10 v1903-1909 (SMBv3)
No auth needed
Prerequisites:
Network access to the target's SMB port (445) · Target system must be running a vulnerable version of Windows 10 with SMBv3 compression enabled
patchapalooza
WORKING POC
by madanokr001 · dos
https://github.com/madanokr001/CVE-2020-0796
This repository contains a functional exploit for CVE-2020-0796 (SMBGhost), which leverages an integer overflow in the SMB protocol to trigger a buffer overflow, potentially leading to a denial-of-service (DoS) or remote code execution (RCE). The PoC includes a Python script that crafts malicious SMB packets with manipulated compression headers to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Windows 10 1903 (SMBv3)
No auth needed
Prerequisites:
Network access to the target SMB service · SMBv3 protocol enabled on the target
patchapalooza
WORKING POC
by keepb1ue · poc
https://gitee.com/keepb1ue/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with compressed data to trigger an arithmetic overflow, leading to privilege escalation.
Classification
Working Poc 95%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 enabled
patchapalooza
WORKING POC
by wsstest · poc
https://gitee.com/wsstest/CVE-2020-0796-PoC
This repository contains a functional PoC for CVE-2020-0796 (SMBGhost), which exploits a buffer overflow in Windows 10 1903/1909's SMB3 compression capability by sending a crafted SMB packet with a malformed compression transform header. The exploit triggers a kernel crash due to improper bounds checking on the offset field in the decompression routine.
Classification
Working Poc 95%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
No auth needed
Prerequisites:
SMB3.1.1 compression capability enabled on target · Network access to SMB port (445)
patchapalooza
WORKING POC
by mirrors_ZecOps · poc
https://gitee.com/mirrors_ZecOps/CVE-2020-0796-RCE-POC
This repository contains a functional exploit for CVE-2020-0796 (SMBGhost), a remote code execution vulnerability in Windows SMBv3. The exploit leverages memory corruption to achieve a reverse shell with system privileges, targeting Windows 10 versions 1903 and 1909.
Classification
Working Poc 95%
Target:
Windows 10 (1903, 1909) SMBv3
No auth needed
Prerequisites:
Target must be running Windows 10 1903 or 1909 · SMBv3 must be enabled · Target offsets must be calculated and adjusted
exploitdb
WORKING POC
by eerykitty · doswindows
https://www.exploit-db.com/exploits/48216
This PoC exploits CVE-2020-0796 (SMBGhost) by sending a malformed SMB3 compression transform header with an invalid offset field, causing a buffer overflow and kernel crash. It modifies the smbprotocol library to support SMB 3.1.1 compression and triggers the vulnerability via a crafted header.
Classification
Working Poc 90%
Target:
Windows 10 1903/1909 with SMB3.1.1 compression enabled
No auth needed
Prerequisites:
Target must have SMB3.1.1 compression enabled · Network access to the target's SMB port (445)
patchapalooza
WORKING POC
by Ken-Abruzzi · local
https://github.com/Ken-Abruzzi/cve_2020_0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with compressed data to trigger an arithmetic overflow, leading to privilege escalation.
Classification
Working Poc 95%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 enabled
patchapalooza
WRITEUP
by Ascotbe · local
https://github.com/Ascotbe/Kernelhub
This repository is a documentation hub for various Windows kernel exploits, including CVE-2020-0796. It contains structured README files, issue templates, and a Python script for generating documentation. No functional exploit code is present.
Classification
Writeup 90%
Target:
Windows Kernel
No auth needed
Prerequisites:
documentation generation tool
metasploit
WORKING POC
GOOD
by Daniel García Gutiérrez, Manuel Blanco Parajón, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2020_0796_smbghost.rb
This Metasploit module exploits CVE-2020-0796, a buffer overflow in the SMBv3 protocol, to achieve local privilege escalation on vulnerable Windows 10 systems. It reflectively injects a DLL into winlogon.exe to execute the payload.
Classification
Working Poc 100%
Target:
Microsoft Windows 10 versions 1903-1909
Auth required
Prerequisites:
Local access to the target system · SMBv3 compression enabled · Meterpreter session
patchapalooza
WORKING POC
by Dyan_code · poc
https://gitee.com/Dyan_code/CVE-2020-0796-SMB
The repository contains a functional Python PoC for CVE-2020-0796, which exploits a buffer overflow vulnerability in the SMBv3 compression mechanism. The code crafts malicious SMB packets with a compressed transform header to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and 2004)
No auth needed
Prerequisites:
Network access to the target's SMB port (445)
patchapalooza
WORKING POC
by ran-sama · dos
https://gitlab.com/ran-sama/CVE-2020-0796
This repository contains a functional Python script that scans for and exploits CVE-2020-0796, a vulnerability in SMBv3 compression. The script sends a malformed SMB packet to trigger a denial-of-service (DoS) condition on vulnerable systems.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903 and 1909)
No auth needed
Prerequisites:
Network access to the target system · SMB port (445) accessible
patchapalooza
WORKING POC
by syadg123 · remote
https://github.com/syadg123/CVE-2020-0796
This repository contains a functional Python-based exploit for CVE-2020-0796, a remote code execution vulnerability in Microsoft SMBv3. The exploit sends a crafted packet to trigger the vulnerability and establishes a reverse shell.
Classification
Working Poc 90%
Target:
Microsoft Windows SMBv3 (SMB 3.1.1)
No auth needed
Prerequisites:
Target IP address · Local IP for reverse shell · Local port for reverse shell
patchapalooza
WORKING POC
by gavz · remote
https://gitlab.com/gavz/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with compressed data to trigger an arithmetic overflow, leading to arbitrary code execution in the context of the winlogon.exe process.
Classification
Working Poc 95%
Target:
Windows 10 SMBv3 Server (versions 1903 and 1909)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 compression enabled
patchapalooza
SCANNER
by llsw · poc
https://gitee.com/llsw/CVE-2020-0796
The repository contains a Python-based Metasploit auxiliary module that scans for CVE-2020-0796 by sending a crafted SMB packet to port 445 and checking the response for vulnerability indicators. It does not exploit the vulnerability but detects its presence.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3 (versions affected by CVE-2020-0796)
No auth needed
Prerequisites:
Network access to target's SMB port (445)
patchapalooza
WORKING POC
by Kaizzzo1 · infoleak
https://github.com/Kaizzzo1/CVE-2020-0796
This repository contains a functional PoC for CVE-2020-0796 (SMBGhost), a buffer overflow vulnerability in the SMBv3 protocol. The exploit sends a maliciously crafted compressed data packet to trigger the vulnerability, potentially leading to remote code execution.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 Version 1903 and 1909, Windows Server Version 1903 and 1909
No auth needed
Prerequisites:
Network access to the target's SMB port (445)
patchapalooza
SCANNER
by Kaizzzo1 · infoleak
https://github.com/Kaizzzo1/cve-2020-00796
The repository contains a Python script that scans for CVE-2020-0796, a pre-authentication remote code execution vulnerability in SMBv3. The script sends a crafted SMB packet and checks the response to determine if the target is vulnerable.
Classification
Scanner 95%
Target:
Microsoft Windows SMBv3 (versions prior to the March 2020 patch)
No auth needed
Prerequisites:
Network access to the target's SMB port (445)
patchapalooza
WORKING POC
by mirrors_danigargu · poc
https://gitee.com/mirrors_danigargu/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with a compressed data field to trigger an arithmetic overflow, leading to arbitrary code execution in kernel mode.
Classification
Working Poc 100%
Target:
Windows 10 (SMBv3)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 enabled
patchapalooza
WORKING POC
by maqeel-git · dos
https://github.com/maqeel-git/CVE-2020-0796-SMBGhost
This repository contains a functional exploit for CVE-2020-0796 (SMBGhost), a vulnerability in the SMBv3 protocol that allows remote code execution. The exploit includes Python scripts for crafting malicious SMB packets and assembly code for shellcode execution.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Vulnerable Windows system with SMBv3 enabled · Network access to the target system
patchapalooza
WORKING POC
by RichChigga · poc
https://gitee.com/RichChigga/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, a vulnerability in Windows SMBv3. The exploit leverages a memory corruption issue in the SMB compression mechanism to achieve privilege escalation.
Classification
Working Poc 100%
Target:
Windows 10 (SMBv3)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system
patchapalooza
WORKING POC
by itcastdarknight · poc
https://gitee.com/itcastdarknight/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with a compressed data field to trigger an integer overflow, leading to arbitrary code execution in kernel mode.
Classification
Working Poc 100%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 compression enabled
patchapalooza
WORKING POC
by yoghourt010 · poc
https://gitee.com/yoghourt010/CVE-2020-0796-SMB
This repository contains a functional Python PoC for CVE-2020-0796 (SMBGhost), which exploits a buffer overflow vulnerability in the SMBv3 compression mechanism. The code crafts malicious SMB packets with a manipulated compression header to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Windows SMBv3 (versions 1903, 1909, and Server 1903, 1909)
No auth needed
Prerequisites:
Network access to target SMB port (445)
patchapalooza
WORKING POC
by cutecuteyu · poc
https://gitee.com/cutecuteyu/CVE-2020-0796
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2020-0796, targeting a memory corruption vulnerability in Windows SMBv3. The exploit leverages a crafted SMB packet with a compressed data field to trigger an arithmetic overflow, leading to arbitrary code execution.
Classification
Working Poc 100%
Target:
Windows 10 SMBv3 Server
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · SMBv3 service running