exploitdb
WORKING POC
by West Shepherd · pythonremotewindows
https://www.exploit-db.com/exploits/49071
This exploit leverages CVE-2020-1472 (ZeroLogon) to reset the password of a domain controller's machine account via a flaw in the Netlogon Remote Protocol. It includes functionality to check, exploit, and restore the target.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (2008 R2, 2012, 2012 R2, 2016, 2019)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed
nomisec
WORKING POC
1,804 stars
by bvcyber · poc
https://github.com/bvcyber/CVE-2020-1472
This repository contains a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
WORKING POC
1,277 stars
by dirkjanm · remote
https://github.com/dirkjanm/CVE-2020-1472
This repository contains a functional proof-of-concept exploit for CVE-2020-1472 (Zerologon), which allows an attacker to bypass authentication and reset the password of a domain controller account to an empty string. The exploit leverages a vulnerability in the Netlogon Remote Protocol (MS-NRPC) to achieve authentication bypass and privilege escalation.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the target domain controller · Python 3.6 or newer · Impacket library with added Netlogon structures
nomisec
WORKING POC
684 stars
by risksense · remote
https://github.com/risksense/zerologon
This repository contains a working exploit for CVE-2020-1472 (ZeroLogon), allowing an attacker to reset the password of a domain controller's machine account to empty and subsequently dump credentials. It includes scripts to set an empty password and restore the original password.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Active Directory Domain Controllers)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed from a specific commit
nomisec
WORKING POC
393 stars
by VoidSec · remote
https://github.com/VoidSec/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (Zerologon), which resets the Domain Controller's account password to an empty string, allowing authentication bypass and privilege escalation to Domain Admin. The exploit leverages a cryptographic flaw in the Netlogon protocol.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (Active Directory Domain Controllers)
No auth needed
Prerequisites:
Network access to a vulnerable Domain Controller · Python 3.7+ with Impacket library
nomisec
WORKING POC
181 stars
by bb00 · remote-auth
https://github.com/bb00/zer0dump
This repository contains a functional PoC exploit for CVE-2020-1472 (Zerologon), enabling unauthenticated domain controller takeover via Netlogon protocol abuse. It includes tools for remote command execution (psexec.py) and credential dumping (secretsdump.py).
Classification
Working Poc 95%
Target:
Windows Server (Domain Controller) with Netlogon role
No auth needed
Prerequisites:
Network access to domain controller · Unpatched CVE-2020-1472 vulnerability
nomisec
WORKING POC
112 stars
by mstxq17 · remote
https://github.com/mstxq17/cve-2020-1472
This repository contains a functional proof-of-concept exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller and reset its password to gain domain admin privileges. The exploit includes tools for testing vulnerability, resetting passwords, and restoring original credentials.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library installed
nomisec
WORKING POC
84 stars
by Rvn0xsy · remote
https://github.com/Rvn0xsy/ZeroLogon
This is a C++ implementation of the ZeroLogon exploit (CVE-2020-1472) that resets the password of a domain controller's machine account by exploiting a vulnerability in the Netlogon Remote Protocol. It uses brute-force to bypass authentication and set a new password.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to a vulnerable domain controller · Knowledge of the domain controller's FQDN, NetBIOS name, and machine account name
nomisec
WORKING POC
61 stars
by zeronetworks · remote
https://github.com/zeronetworks/zerologon
This is a Python-based proof-of-concept for CVE-2020-1472 (Zerologon), demonstrating authentication bypass via RPC/SMB. It attempts to exploit the vulnerability by sending zeroed-out credentials to the Netlogon service, with optional SMB authentication and packet privacy.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · NetBIOS name and IP address of the domain controller
nomisec
WORKING POC
57 stars
by k8gege · remote
https://github.com/k8gege/CVE-2020-1472-EXP
This repository contains a Python-based exploit for CVE-2020-1472 (Zerologon), which allows an attacker to bypass authentication on a vulnerable domain controller by exploiting a flaw in the Netlogon Remote Protocol. The exploit sets the machine account password to an empty string, enabling further attacks like secretsdump.py for credential extraction.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · Netlogon Remote Protocol (MS-NRPC) accessible on TCP port 445
nomisec
WORKING POC
38 stars
by cube0x0 · remote
https://github.com/cube0x0/CVE-2020-1472
This is a functional exploit for CVE-2020-1472 (Zerologon), which exploits a cryptographic flaw in the Netlogon Remote Protocol to authenticate as a domain controller and reset the machine account password. The PoC demonstrates the vulnerability by performing a brute-force attack to achieve authentication bypass.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
WORKING POC
22 stars
by Privia-Security · remote
https://github.com/Privia-Security/ADZero
This is a functional exploit for CVE-2020-1472 (Zerologon), which allows an unauthenticated attacker to compromise a vulnerable Domain Controller by exploiting a cryptographic flaw in the Netlogon protocol. The PoC automates the attack, resets the machine account password, and escalates to domain administrator privileges.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (unpatched versions)
No auth needed
Prerequisites:
Network access to the target Domain Controller · Unpatched Windows Server (pre-August 2020 updates)
nomisec
WORKING POC
18 stars
by sho-luv · remote
https://github.com/sho-luv/zerologon
This repository contains a Python-based proof-of-concept exploit for CVE-2020-1472 (Zerologon), which allows an attacker to zero out the password of a domain controller's machine account and dump NTDS hashes. The exploit leverages a vulnerability in the Netlogon Remote Protocol (MS-NRPC) to establish a vulnerable security channel.
Classification
Working Poc 95%
Target:
Windows Server (various versions, see README for full list)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with added Netlogon structures
nomisec
SCANNER
11 stars
by B34MR · poc
https://github.com/B34MR/zeroscan
This repository contains a vulnerability scanner for Domain Controllers, specifically checking for CVE-2020-1472 (Zerologon), MS-PAR/MS-RPRN, and SMBv2 Signing. It does not exploit vulnerabilities but scans for their presence.
Classification
Scanner 100%
Target:
Microsoft Windows Domain Controllers
No auth needed
Prerequisites:
Network access to target Domain Controllers · Nmap and Impacket installed
nomisec
SCANNER
11 stars
by WiIs0n · remote
https://github.com/WiIs0n/Zerologon_CVE-2020-1472
This repository contains a Python script to check for the Zerologon vulnerability (CVE-2020-1472) in domain controllers. It attempts to authenticate using a zero challenge and credential to determine if the target is vulnerable.
Classification
Scanner 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · NetBIOS or IP address of the target
nomisec
WORKING POC
10 stars
by sv3nbeast · remote
https://github.com/sv3nbeast/CVE-2020-1472
This repository contains a working exploit for CVE-2020-1472 (Zerologon), which allows an attacker to bypass authentication and reset the password of a domain controller's machine account to an empty string. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the target domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
WORKING POC
8 stars
by thatonesecguy · remote
https://github.com/thatonesecguy/zerologon-CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account and reset its password to an empty value. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol to achieve authentication bypass and privilege escalation.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · Python 3.7 or higher · Impacket library with Netlogon structures
nomisec
SCANNER
7 stars
by YossiSassi · poc
https://github.com/YossiSassi/ZeroLogon-Exploitation-Check
This PowerShell script checks for potential exploitation of CVE-2020-1472 (ZeroLogon) by analyzing NetLogon debug logs and Windows Event Logs for suspicious authentication patterns and password resets. It does not exploit the vulnerability but detects artifacts of exploitation.
Classification
Scanner 95%
Target:
Microsoft Windows Server (Domain Controllers)
Auth required
Prerequisites:
Domain access · Permissions to read Event Logs and NetLogon debug logs
github
WORKING POC
6 stars
by Y5neKO · pythonpoc
https://github.com/Y5neKO/ExpAndPoc_Collection/tree/main/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (Zerologon), which allows unauthenticated attackers to compromise a Domain Controller by setting its computer account password to an empty value. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol to bypass authentication.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller)
No auth needed
Prerequisites:
Network access to the target Domain Controller · NetBIOS name of the Domain Controller
nomisec
SCANNER
5 stars
by CPO-EH · infoleak
https://github.com/CPO-EH/CVE-2020-1472_ZeroLogonChecker
This repository contains a C# vulnerability checker for CVE-2020-1472 (ZeroLogon), which tests whether a domain controller is vulnerable by attempting to exploit the authentication bypass flaw in Netlogon. It does not execute a full exploit but checks for vulnerability by simulating the attack.
Classification
Scanner 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · FQDN of the target domain controller
nomisec
WORKING POC
5 stars
by striveben · remote
https://github.com/striveben/CVE-2020-1472
This repository contains a working exploit for CVE-2020-1472 (Zerologon), which allows an attacker to elevate privileges by exploiting a vulnerability in the Netlogon Remote Protocol. The exploit resets the domain controller's account password to an empty string, enabling further attacks.
Classification
Working Poc 95%
Target:
Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library
nomisec
WORKING POC
3 stars
by guglia001 · remote
https://github.com/guglia001/MassZeroLogon
This repository contains a Python script for mass scanning and exploiting CVE-2020-1472 (ZeroLogon), a critical vulnerability in Netlogon Remote Protocol (MS-NRPC). The script attempts to authenticate with a zeroed-out challenge and credential to determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · NetBIOS or hostname resolution for the target
nomisec
WORKING POC
3 stars
by NAXG · remote
https://github.com/NAXG/CVE-2020-1472
This repository contains a functional proof-of-concept exploit for CVE-2020-1472 (Zerologon), which allows an attacker to authenticate as a domain controller by exploiting a cryptographic flaw in the Netlogon protocol. The exploit resets the domain controller's password, enabling full domain compromise.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the domain controller · NetBIOS name of the domain controller
nomisec
WORKING POC
2 stars
by RicYaben · remote
https://github.com/RicYaben/CVE-2020-1472-LAB
This repository contains a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using the Impacket library. It includes a lab setup with a vulnerable Windows Server 2019 VM configured as a Domain Controller.
Classification
Working Poc 95%
Target:
Windows Server Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target Domain Controller · Impacket library installed · Python 3.7 or higher
nomisec
WORKING POC
2 stars
by whoami-chmod777 · remote
https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC
This repository contains a functional proof-of-concept exploit for CVE-2020-1472 (Zerologon), which allows an attacker to authenticate as a domain controller by exploiting a cryptographic flaw in the Netlogon protocol. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · Python 3.6 or newer · Impacket library with Netlogon structures
nomisec
WORKING POC
2 stars
by Akash7350 · remote-auth
https://github.com/Akash7350/CVE-2020-1472
This repository contains a Python-based exploit for CVE-2020-1472 (Zerologon), which allows an attacker to bypass authentication and reset the Domain Controller's account password to an empty string. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the target Domain Controller · Impacket library installed
nomisec
SCANNER
2 stars
by Anonymous-Family · poc
https://github.com/Anonymous-Family/Zero-day-scanning
This repository contains a vulnerability scanner for Domain Controllers, specifically checking for CVE-2020-1472 (Zerologon), MS-PAR/MS-RPRN, and SMBv2 Signing. It does not exploit vulnerabilities but scans for their presence.
Classification
Scanner 100%
Target:
Microsoft Windows Domain Controllers
No auth needed
Prerequisites:
Network access to the target Domain Controller · Python 3.9 · Impacket · Nmap
nomisec
WORKING POC
2 stars
by shanfenglan · remote
https://github.com/shanfenglan/cve-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (Zerologon), which allows an attacker to reset the password of a domain controller's machine account to an empty string. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol (MS-NRPC) to achieve authentication bypass and privilege escalation.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with modified nrpc.py file
nomisec
WORKING POC
2 stars
by rhymeswithmogul · poc
https://github.com/rhymeswithmogul/Set-ZerologonMitigation
This PowerShell script mitigates CVE-2020-1472 (Zerologon) by enforcing secure RPC for Netlogon on domain controllers. It checks for required updates and sets the 'FullSecureChannelProtection' registry key to enable protection.
Classification
Working Poc 100%
Target:
Microsoft Windows Domain Controllers (with August/September 2020 updates)
Auth required
Prerequisites:
Administrator privileges · Domain controller role · August or September 2020 security updates installed
nomisec
WORKING POC
2 stars
by 0xcccc666 · remote
https://github.com/0xcccc666/cve-2020-1472_Tool-collection
This repository contains a functional exploit for CVE-2020-1472 (Zerologon), which allows an attacker to authenticate as a domain controller and reset its password. The exploit leverages a cryptographic flaw in the Netlogon protocol to achieve authentication bypass.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (unpatched versions)
No auth needed
Prerequisites:
Network access to the domain controller · NetBIOS name of the target domain controller
nomisec
WORKING POC
2 stars
by CanciuCostin · remote
https://github.com/CanciuCostin/CVE-2020-1472
This repository contains a Python script that exploits CVE-2020-1472 (ZeroLogon), a vulnerability in the Netlogon Remote Protocol allowing authentication bypass by setting an empty password for a domain controller account. The script uses the Impacket library to perform brute-force attempts to exploit the flaw.
Classification
Working Poc 95%
Target:
Windows Domain Controller (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed
nomisec
WORKING POC
2 stars
by 0xkami · remote
https://github.com/0xkami/CVE-2020-1472
This is a functional PoC for CVE-2020-1472 (Zerologon), which exploits a cryptographic flaw in Netlogon to authenticate as a domain controller and reset its password. The script uses brute-force to bypass authentication and demonstrates the vulnerability by resetting the target computer's password.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (unpatched versions)
No auth needed
Prerequisites:
Network access to the target domain controller · NetBIOS name of the domain controller · IP address of the domain controller
nomisec
WORKING POC
1 stars
by mods20hh · remote
https://github.com/mods20hh/ZeroLogon-PoC-DC-Pwn
This repository contains a functional proof-of-concept exploit for CVE-2020-1472 (ZeroLogon), which allows an unauthenticated attacker to reset the password of a Domain Controller's machine account via a cryptographic flaw in the Netlogon protocol. The exploit includes both the C++ implementation for the attack and a Python script for post-exploitation credential dumping.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Domain Controllers) with Netlogon protocol
No auth needed
Prerequisites:
Network access to the target Domain Controller · Unpatched system vulnerable to CVE-2020-1472
nomisec
WORKING POC
1 stars
by TheJoyOfHacking · remote
https://github.com/TheJoyOfHacking/dirkjanm-CVE-2020-1472
This repository contains a functional proof-of-concept exploit for CVE-2020-1472 (Zerologon), which allows an attacker to authenticate to a domain controller with an empty password and reset the machine account password. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the target domain controller · Python 3.6+ with impacket library
nomisec
WORKING POC
1 stars
by Fa1c0n35 · remote
https://github.com/Fa1c0n35/SecuraBV-CVE-2020-1472
This repository contains a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the target domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
WORKING POC
1 stars
by Udyz · remote
https://github.com/Udyz/Zerologon
This repository contains a Python-based exploit for CVE-2020-1472 (Zerologon), a critical privilege escalation vulnerability in Netlogon. The exploit manipulates the Netlogon protocol to authenticate as a domain controller and reset passwords.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (all versions prior to the patch)
No auth needed
Prerequisites:
Network access to a vulnerable domain controller · Python environment with Impacket library
nomisec
WORKING POC
1 stars
by hell-moon · remote
https://github.com/hell-moon/ZeroLogon-Exploit
This is a functional exploit for CVE-2020-1472 (ZeroLogon) that resets the domain controller's machine account password to null, allowing hash dumping without authentication. It leverages Impacket's NRPC implementation to perform the attack.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the target domain controller · Unpatched system vulnerable to CVE-2020-1472
nomisec
WORKING POC
1 stars
by wrathfulDiety · remote
https://github.com/wrathfulDiety/zerologon
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), allowing an attacker to set an empty password for a domain controller's machine account and escalate privileges to Domain Admin. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library with specific modifications
nomisec
WORKING POC
1 stars
by b1ack0wl · remote
https://github.com/b1ack0wl/CVE-2020-1472
This is a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · Python 3.6 or newer · Impacket library with Netlogon structures
nomisec
SCANNER
1 stars
by mingchen-script · poc
https://github.com/mingchen-script/CVE-2020-1472-visualizer
This PowerShell script scans Windows Event Logs (EVTX files) for events related to CVE-2020-1472 (Zerologon) and exports them to CSV for analysis in Excel. It does not exploit the vulnerability but aids in detecting exploitation attempts.
Classification
Scanner 90%
Target:
Microsoft Windows Server (Event Logs)
Auth required
Prerequisites:
Access to Windows Event Logs (EVTX files) · Excel 2013 or later for analysis
nomisec
WORKING POC
1 stars
by midpipps · remote
https://github.com/midpipps/CVE-2020-1472-Easy
This is a functional exploit for CVE-2020-1472 (ZeroLogon), which leverages a vulnerability in the Netlogon Remote Protocol to impersonate a domain controller, dump registry hives, extract the machine password, and reinstall the original password. It includes a semi-interactive shell for post-exploitation.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed
nomisec
WRITEUP
1 stars
by murataydemir · poc
https://github.com/murataydemir/CVE-2020-1472
This repository provides a writeup and instructions for exploiting CVE-2020-1472 (Zerologon), a privilege escalation vulnerability in the Netlogon Remote Protocol (MS-NRPC) due to insecure AES-CFB8 usage. It references external repositories for the actual exploit code and testing tools.
Classification
Writeup 100%
Target:
Microsoft Windows Server (Domain Controller)
No auth needed
Prerequisites:
Network access to the Domain Controller · Python environment with required dependencies
nomisec
WORKING POC
1 stars
by npocmak · remote
https://github.com/npocmak/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to bypass authentication and reset the password of a domain controller account to an empty string. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library with added Netlogon structures
nomisec
WRITEUP
1 stars
by McKinnonIT · poc
https://github.com/McKinnonIT/zabbix-template-CVE-2020-1472
This repository provides a Zabbix template for monitoring Windows Event Viewer events related to CVE-2020-1472 (Netlogon Elevation of Privilege Vulnerability). It focuses on detecting event IDs 5827, 5828, and 5829, which are indicators of exploitation attempts.
Classification
Writeup 90%
Target:
Zabbix (monitoring tool)
Auth required
Prerequisites:
Zabbix monitoring setup · Access to Windows Event Logs
nomisec
WORKING POC
1 stars
by jiushill · poc
https://github.com/jiushill/CVE-2020-1472
This repository contains a Python-based exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to bypass authentication and reset the password of a domain controller. The exploit uses the Impacket library to perform Netlogon authentication bypass and password reset.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed
nomisec
WORKING POC
by noemvex · poc
https://github.com/noemvex/apex-predator
The repository contains a functional Python-based tool for exploiting CVE-2020-1472 (ZeroLogon) and other Active Directory vulnerabilities. It includes SMB signing checks, ZeroLogon detection, and LAPS password extraction, with a focus on stealthy reconnaissance and reporting.
Classification
Working Poc 90%
Target:
Microsoft Windows Server (Active Directory, Netlogon RPC)
No auth needed
Prerequisites:
Python 3.x · impacket library · ldap3 library · network access to target Domain Controller
gitlab
WORKING POC
by NdFeB · poc
https://gitlab.com/NdFeB/zer0dump-installer
This repository provides an installer script for Zer0Dump, a tool that exploits CVE-2020-1472 (ZeroLogon) to dump password hashes from Active Directory domain controllers. It automates the setup of dependencies (Impacket, CrackMapExec) and includes a post-exploitation script for lateral movement using a PowerShell reverse shell.
Classification
Working Poc 95%
Target:
Microsoft Windows Active Directory (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Linux host or Docker environment · Network access to target domain controller · Python 3
gitlab
WORKING POC
by darthploit · poc
https://gitlab.com/darthploit/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to authenticate to a domain controller with a zeroed-out password and reset the machine account password. The exploit leverages a cryptographic flaw in the Netlogon protocol to achieve authentication bypass and privilege escalation.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library with Netlogon structures
gitlab
WORKING POC
by null-p4n · poc
https://gitlab.com/null-p4n/zerologon
This repository contains functional exploit code for CVE-2020-1472 (ZeroLogon), which allows an attacker to set an empty password for a domain controller's machine account and subsequently dump credentials. The scripts demonstrate the vulnerability by exploiting a cryptographic flaw in the Netlogon authentication process.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed from a specific commit
nomisec
WORKING POC
by commit2main · remote
https://github.com/commit2main/zerologon-lab
This is a functional exploit for CVE-2020-1472 (Zerologon), which allows an attacker to authenticate to a Domain Controller with empty credentials and reset the machine account password. The script includes both vulnerability testing and exploitation capabilities.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (unpatched versions)
No auth needed
Prerequisites:
Network access to the target Domain Controller · NetBIOS name and IP address of the target
nomisec
WRITEUP
by nyambiblaise · poc
https://github.com/nyambiblaise/Domain-Controller-DC-Exploitation-with-Metasploit-Impacket
This is a detailed writeup documenting the exploitation of CVE-2020-1472 (Zerologon) on a Windows Domain Controller using Metasploit and Impacket. It includes steps for discovery, exploitation, credential extraction, and post-exploitation validation.
Classification
Writeup 100%
Target:
Windows Domain Controller (CVE-2020-1472)
No auth needed
Prerequisites:
Network access to the target DC · Vulnerable DC (unpatched for CVE-2020-1472) · Metasploit and Impacket tools
nomisec
WRITEUP
by 100HnoMeuNome · poc
https://github.com/100HnoMeuNome/ZeroLogon-CVE-2020-1472-lab
This repository provides a detailed educational walkthrough of CVE-2020-1472 (ZeroLogon), including steps to test and exploit the vulnerability using tools like Impacket and SecuraBV's tester. It demonstrates privilege escalation via pass-the-hash attacks and persistence techniques.
Classification
Writeup 100%
Target:
Microsoft Netlogon Remote Protocol (MS-NRPC) on Windows Server 2008 R2, 2012, 2016, 2019
No auth needed
Prerequisites:
Network access to vulnerable DC · Impacket and SecuraBV's ZeroLogon tester tools
nomisec
WRITEUP
by tdevworks · poc
https://github.com/tdevworks/CVE-2020-1472-ZeroLogon-Demo-Detection-Mitigation
This repository is a writeup demonstrating detection and mitigation techniques for CVE-2020-1472 (ZeroLogon), including vulnerability testing, Windows Event Log analysis, and Suricata IDS rules. It references external PoC scripts and tools but does not contain exploit code itself.
Classification
Writeup 100%
Target:
Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Access to a vulnerable domain controller · Python with impacket library for testing · Suricata with custom rules for detection
nomisec
WRITEUP
by PakwanSK · poc
https://github.com/PakwanSK/Simulating-and-preventing-Zerologon-CVE-2020-1472-vulnerability-attacks.
This repository is a writeup documenting the simulation and prevention of the Zerologon (CVE-2020-1472) vulnerability attack in Active Directory on Windows Server 2016. It references external tools and provides operational results, including reports and presentations.
Classification
Writeup 90%
Target:
Windows Server 2016 Active Directory (Netlogon protocol)
No auth needed
Prerequisites:
Access to a vulnerable Windows Server 2016 Domain Controller · Network access to the target system
nomisec
WORKING POC
by TuanCui22 · poc
https://github.com/TuanCui22/ZerologonWithImpacket-CVE2020-1472
This repository contains a proof-of-concept exploit for CVE-2020-1472 (Zerologon), leveraging Impacket to exploit a vulnerability in the Netlogon Remote Protocol. The exploit allows an attacker to authenticate as a domain controller and potentially take over a domain.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (Netlogon)
No auth needed
Prerequisites:
Network access to a vulnerable domain controller · Impacket library installed
nomisec
WORKING POC
by blackh00d · remote-auth
https://github.com/blackh00d/zerologon-poc
This is a functional PoC for CVE-2020-1472 (Zerologon), which exploits a vulnerability in Netlogon to reset the domain controller's password to an empty string, enabling privilege escalation and DCsync attacks.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · NetBIOS name and IP address of the target DC
nomisec
WRITEUP
by JolynNgSC · poc
https://github.com/JolynNgSC/Zerologon_CVE-2020-1472
This repository is a writeup documenting the steps to exploit CVE-2020-1472 (Zerologon) using existing tools like Impacket. It includes instructions for exploitation, detection via Windows Event Viewer, and mitigation steps.
Classification
Writeup 90%
Target:
Windows Server 2016 (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to target domain controller · Impacket toolkit · Valid NETBIOS name and IP address of target
nomisec
WORKING POC
by metehangelgi · poc
https://github.com/metehangelgi/CVE-2020-1472-LAB
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to interact with the Netlogon RPC service and confirms vulnerability if the authentication succeeds.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon service
No auth needed
Prerequisites:
Network access to the target Domain Controller · NetBIOS computer name of the DC · Unpatched Windows Server (pre-August 2020 patches)
nomisec
WORKING POC
by logg-1 · remote
https://github.com/logg-1/0logon
This is a functional exploit for CVE-2020-1472 (ZeroLogon), which leverages a cryptographic flaw in the Netlogon authentication process to bypass authentication and reset the domain controller's machine account password. The exploit uses Impacket to perform RPC-based attacks against vulnerable domain controllers.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed
nomisec
WORKING POC
by c3rrberu5 · remote
https://github.com/c3rrberu5/ZeroLogon-to-Shell
This PoC exploits CVE-2020-1472 (ZeroLogon) to reset the domain controller's password and gain a shell via evil-winrm. It combines the original ZeroLogon exploit with an automated evil-winrm command for post-exploitation.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the domain controller · Administrator NTLM hash for evil-winrm · evil-winrm installed
nomisec
WORKING POC
by Anonymous-Family · infoleak
https://github.com/Anonymous-Family/CVE-2020-1472
This repository contains a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
WORKING POC
by dr4g0n23 · remote-auth
https://github.com/dr4g0n23/CVE-2020-1472
This repository contains a working PoC for CVE-2020-1472 (Zerologon), a critical privilege escalation vulnerability in Netlogon. It includes scripts to exploit the flaw, dump secrets, and execute commands via WMI/PSEXEC.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to domain controller · SMB/Netlogon access
nomisec
WORKING POC
by likeww · remote
https://github.com/likeww/MassZeroLogon
This repository contains a Python script for mass scanning and exploiting the ZeroLogon vulnerability (CVE-2020-1472) in Active Directory domain controllers. It automates the authentication bypass by sending crafted Netlogon requests with zeroed-out credentials.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to target domain controller · Nmap for initial scanning · Python dependencies (impacket, libnmap)
nomisec
WORKING POC
by carlos55ml · remote
https://github.com/carlos55ml/zerologon
This repository contains a functional proof-of-concept exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to set the machine account password of a vulnerable domain controller to an empty string. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol (MS-NRPC) to bypass authentication.
Classification
Working Poc 95%
Target:
Microsoft Active Directory Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · A modified version of the Impacket library
nomisec
WORKING POC
by TheJoyOfHacking · infoleak
https://github.com/TheJoyOfHacking/SecuraBV-CVE-2020-1472
This is a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It uses the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed
nomisec
WORKING POC
by Fa1c0n35 · remote
https://github.com/Fa1c0n35/CVE-2020-1472-02-
This is a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It uses the Impacket library to interact with the Netlogon RPC service and determines vulnerability based on the response.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
WORKING POC
by puckiestyle · remote
https://github.com/puckiestyle/CVE-2020-1472
This repository contains a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
WORKING POC
by itssmikefm · remote
https://github.com/itssmikefm/CVE-2020-1472
This is a functional exploit for CVE-2020-1472 (Zerologon), which resets the domain controller's account password to an empty string by exploiting a cryptographic flaw in Netlogon. It performs brute-force authentication attempts with zeroed credentials.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · NetBIOS name of the target DC
nomisec
WORKING POC
by SaharAttackit · remote
https://github.com/SaharAttackit/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (Zerologon), which allows an unauthenticated attacker to reset the password of a domain controller's Active Directory account to an empty string. The exploit leverages a cryptographic flaw in the Netlogon Remote Protocol (MS-NRPC).
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the target domain controller · Netlogon Remote Protocol (MS-NRPC) accessible on the target
nomisec
WORKING POC
by JayP232 · poc
https://github.com/JayP232/The_big_Zero
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), automating the process of exploiting a vulnerable Domain Controller to dump credentials and gain access via Evil-WinRM. The scripts are designed to chain the exploit with credential extraction and remote access.
Classification
Working Poc 90%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the target Domain Controller · Impacket library installed · Evil-WinRM for post-exploitation access
nomisec
WORKING POC
by Whippet0 · remote
https://github.com/Whippet0/CVE-2020-1472
This repository contains multiple Python scripts exploiting CVE-2020-1472 (Zerologon), a critical vulnerability in Netlogon Remote Protocol (MS-NRPC). The exploit allows an unauthenticated attacker to impersonate a domain controller and set an empty password, leading to domain compromise.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · Netlogon service exposed
nomisec
SCANNER
by maikelnight · poc
https://github.com/maikelnight/zerologon
This repository contains PowerShell scripts to detect non-compliant devices vulnerable to CVE-2020-1472 (ZeroLogon) by querying specific Event IDs (5827-5831) from domain controllers. The scripts do not exploit the vulnerability but scan for indicators of unpatched systems.
Classification
Scanner 90%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
Auth required
Prerequisites:
Access to domain controller event logs · Valid credentials to query event logs
nomisec
WORKING POC
by Ken-Abruzzi · remote
https://github.com/Ken-Abruzzi/cve-2020-1472
This repository contains a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Knowledge of the domain controller's NetBIOS name and IP address
nomisec
SCANNER
by grupooruss · poc
https://github.com/grupooruss/CVE-2020-1472
This PowerShell script scans domain controllers for specific security updates related to CVE-2020-1472 (Zerologon) and exports compliance data to a CSV file. It does not exploit the vulnerability but checks for patch compliance.
Classification
Scanner 90%
Target:
Microsoft Active Directory Domain Controllers (Windows Server)
Auth required
Prerequisites:
Domain access · PowerShell execution rights · Active Directory module
nomisec
WORKING POC
by t31m0 · remote
https://github.com/t31m0/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with Netlogon structures
nomisec
WORKING POC
by hectorgie · remote
https://github.com/hectorgie/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to authenticate as a domain controller by exploiting a cryptographic flaw in the Netlogon protocol. The exploit resets the DC account password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with Netlogon structures
nomisec
WORKING POC
by victim10wq3 · remote
https://github.com/victim10wq3/CVE-2020-1472
This repository contains a Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed · Python 3.7 or higher
nomisec
WORKING POC
by Fa1c0n35 · remote
https://github.com/Fa1c0n35/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with Netlogon structures
nomisec
SCANNER
by Tobey123 · poc
https://github.com/Tobey123/CVE-2020-1472-visualizer
This PowerShell script scans Windows Event Logs (EVTX files) for specific events related to CVE-2020-1472 (Zerologon) and exports them to CSV for analysis in Excel. It does not contain exploit code but aids in detecting exploitation attempts.
Classification
Scanner 90%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Access to Windows Event Logs (EVTX files)
metasploit
WORKING POC
by Tom Tervoort, Spencer McIntyre, Dirk-jan Mollema · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/dcerpc/cve_2020_1472_zerologon.rb
This Metasploit module exploits CVE-2020-1472 (Zerologon) to reset a machine account password to empty by leveraging a cryptographic flaw in Netlogon authentication. It includes both removal and restoration of the password.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the target domain controller · NetBIOS name of the target server
patchapalooza
WORKING POC
by jasminalex · poc
https://gitee.com/jasminalex/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with Netlogon structures
patchapalooza
WORKING POC
by trfpatriotic · poc
https://gitee.com/trfpatriotic/CVE-2020-1472
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the target domain controller · Python 3.7 or higher · Impacket library
patchapalooza
WORKING POC
by mirrors_gladiopeace · poc
https://gitee.com/mirrors_gladiopeace/CVE-2020-1472
This repository contains a functional Python script that exploits CVE-2020-1472 (ZeroLogon), a vulnerability in the Netlogon Remote Protocol allowing authentication bypass by leveraging weak AES-CFB8 encryption. The script uses the Impacket library to perform brute-force attempts to spoof a domain controller's identity and set an empty password.
Classification
Working Poc 100%
Target:
Windows Domain Controllers (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library installed
patchapalooza
WORKING POC
by mirrors_dirkjanm · poc
https://gitee.com/mirrors_dirkjanm/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the domain controller · Python 3.6 or newer · Impacket library with Netlogon structures
patchapalooza
WORKING POC
by mirrors_SecuraBV · poc
https://gitee.com/mirrors_SecuraBV/CVE-2020-1472
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Network access to the target domain controller · Python 3.7 or higher · Impacket library
patchapalooza
WORKING POC
by keyboxdzd · poc
https://gitee.com/keyboxdzd/zerologon
This repository contains functional exploit code for CVE-2020-1472 (ZeroLogon), which allows an attacker to set an empty password for a domain controller's machine account and subsequently dump credentials. The scripts demonstrate the vulnerability by exploiting a cryptographic flaw in the Netlogon authentication process.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Netlogon Remote Protocol)
No auth needed
Prerequisites:
Network access to the target domain controller · Impacket library (specific commit required)
patchapalooza
WORKING POC
by keyboxdzd · poc
https://gitee.com/keyboxdzd/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the domain controller · Python 3.6 or newer · Impacket library with Netlogon structures
patchapalooza
WORKING POC
by minquangao123 · poc
https://gitee.com/minquangao123/CVE-2020-1472
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. The script leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Python 3.7 or higher · Impacket library · Network access to target domain controller
patchapalooza
WORKING POC
by sh3llsas · poc
https://gitee.com/sh3llsas/CVE-2020-1472
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. The script uses the Impacket library to interact with the Netlogon RPC interface and determines vulnerability based on the response from the domain controller.
Classification
Working Poc 95%
Target:
Microsoft Windows Server (Domain Controllers with Netlogon RPC)
No auth needed
Prerequisites:
Network access to the target domain controller · NetBIOS computer name of the domain controller · Python 3.7 or higher with Impacket library
patchapalooza
WORKING POC
by omg2019 · poc
https://gitee.com/omg2019/CVE-2020-1472
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Python 3.7 or higher · Impacket library · Network access to the target domain controller
patchapalooza
WORKING POC
by csharphpython · poc
https://gitee.com/csharphpython/CVE-2020-1472
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. It leverages the Impacket library to perform RPC calls and determine if a domain controller is vulnerable.
Classification
Working Poc 100%
Target:
Microsoft Windows Netlogon Remote Protocol (Domain Controllers)
No auth needed
Prerequisites:
Python 3.7 or higher · Impacket library · Network access to target domain controller
patchapalooza
WORKING POC
by we88c0de · remote
https://gitlab.com/we88c0de/CVE-2020-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller account by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the domain controller's password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller) with Netlogon Remote Protocol
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with added Netlogon structures
patchapalooza
WORKING POC
by mos165 · remote
https://github.com/mos165/CVE-20200-1472
This repository contains a functional exploit for CVE-2020-1472 (ZeroLogon), which allows an attacker to impersonate a domain controller by exploiting a cryptographic flaw in the Netlogon authentication process. The exploit resets the DC account password to an empty string, enabling further attacks like DCSync.
Classification
Working Poc 100%
Target:
Microsoft Windows Server (Domain Controller)
No auth needed
Prerequisites:
Network access to the domain controller · Impacket library with Netlogon structures
patchapalooza
WORKING POC
by SecuraBV · remote
https://github.com/SecuraBV/CVE-2020-1472
This repository contains a functional Python script that tests for the ZeroLogon vulnerability (CVE-2020-1472) by attempting to bypass Netlogon authentication using an all-zero challenge and credential. The script uses the Impacket library to perform the attack and includes a Dockerfile for easy deployment.
Classification
Working Poc 95%
Target:
Microsoft Windows Netlogon Remote Protocol (MS-NRPC)
No auth needed
Prerequisites:
Network access to the target domain controller · NetBIOS computer name of the domain controller · IP address of the domain controller
patchapalooza
WRITEUP
by Ascotbe · remote
https://github.com/Ascotbe/Kernelhub
This repository contains documentation and configuration scripts for a collection of Windows exploits, including CVE-2003-0352, CVE-2006-3439, and others. It includes README files in both Chinese and English, as well as a Python script for generating documentation.
Classification
Writeup 90%
Target:
Various Windows vulnerabilities
No auth needed
Prerequisites:
Access to the repository · Python environment for documentation generation