关联漏洞
描述
This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67
介绍
# ZeroPoint.ps1
> ⚠ A defensive PowerShell utility to detect and mitigate exploitation of the *CVE-2025-53770* zero-day vulnerability in *Microsoft SharePoint Server*.

---
## 🔍 What it Does
This PowerShell script is designed to:
- Detect compromise indicators, such as suspicious .aspx webshells
- Parse ULS logs to identify deserialization/spoofing activity
- Verify critical security settings like AMSI and Microsoft Defender
- Provide *optional emergency mitigation* to disconnect external interfaces
---
## 🚨 CVE Details
- *CVE:* CVE-2025-53770
- *Type:* Remote Code Execution (RCE)
- *CVSS Score:* 9.8 (Critical)
- *Affected:* Microsoft SharePoint Server (on-premises)
- *Status:* Zero-day *actively exploited*, no official patch at time of script release
---
## 👨💻 Authors
- @n1chr0x
- @BlackRazer67
---
## 🧰 Usage
### 🔸 Run the script on your SharePoint server:
1. Open *PowerShell as Administrator*
2. Navigate to the script directory.
3. Run "powershell -ep bypass"
4. Run the script ".\ZeroPoint.ps1"
## ✨ Features
- Clean CLI output
- Easily auditable
- Safe for production — does *not* exploit or modify SharePoint
- Compatible with:
- Windows Server 2016+
- SharePoint Server 2016 / 2019 / Subscription Edition
文件快照
[4.0K] /data/pocs/050c93cdfbaf83bf91b80ba385d0cc2ce156ce08
├── [ 34K] LICENSE
├── [1.3K] README.md
├── [ 14K] Zeropoint.png
└── [5.2K] ZeroPoint.ps1
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。