Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21746 PoC — Microsoft Windows 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 安全漏洞 (CVE-2023-21746)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows NTLM存在安全漏洞。攻击者利用该漏洞可以提升权限。
File Snapshot

[4.0K] /data/pocs/ad162662700efca5bfac459780d10b31dbc676d7 ├── [1.1K] detecting_local_potato.yml ├── [1.6K] detecting_storscv_and_sprintcsp_dll.yml ├── [ 10K] Readme.md ├── [4.0K] RpcClient │   ├── [4.0K] RpcClient │   │   ├── [1.0K] RpcClient.cpp │   │   ├── [7.1K] RpcClient.vcxproj │   │   ├── [1.1K] RpcClient.vcxproj.filters │   │   ├── [ 162] RpcClient.vcxproj.user │   │   ├── [ 68K] storsvc_c.c │   │   └── [4.1K] storsvc_h.h │   └── [1.4K] RpcClient.sln ├── [4.0K] SprintCSP │   ├── [4.0K] SprintCSP │   │   ├── [7.7K] main.c │   │   ├── [7.0K] SprintCSP.vcxproj │   │   ├── [ 979] SprintCSP.vcxproj.filters │   │   └── [ 163] SprintCSP.vcxproj.user │   └── [1.4K] SprintCSP.sln └── [ 324] yara_rule_for_detection.yar 4 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.