Shadow Brokers Exploit Reference Table v0.3 by @etlow
Comments
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

 
£
%
123
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Still loading...
ABCDEFGHIJKLMNOPQRSTUVWXYZAAAB
1
ТypeTARGETCVEIs patched?NOTESSERVICEAUTH
VERSIONS
NTXP
VISTA
781020002003200820122016
2
EARLYSHOVELExploitREDHAT 7.0/7.1SENDMAIL8.11.x
3
EASYBEEExploitMDAEMONWEBADMIN http://www.altn.com/Support/#EasyBeeExploitNoticeHTTP/HTTPS
9.5.2-10.1.2 (except 10.0.0)
4
EASYPIExploitLOTUS MAILLOTUS MAIL(TCP) 3264YYYY
5
EBBISLAND/EBBSHAVEExploitSOLARIS 6-10RPC XDR6 - 10
6
ECHOWRECKERExploitLINUXCVE-2003-0201?SAMBA 3.0.x3.0.x
7
ECLIPSEDWINGExploitSERVER SERVICECVE-2008-4250
Addressed by MS08-067
MS08-067(TCP 445) SMB/ (TCP 139) NBTYYYY
8
EDUCATEDSCHOLARExploitSMBv2CVE-2009-3103MS09-050(TCP 445) SMBYY
9
EEExploitProftpd 1.2CVE-2011-4130RHEL 7.3+
10
EMERALDTHREADExploitSMBCVE-2010-2729MS10-061(TCP 445) SMB/ (TCP 139) NBTY?YY
11
EMPHASISMINEExploitLOTUS DOMINOCVE-2017-1274http://www-01.ibm.com/support/docview.wss?uid=swg22002280(TCP 143) IMAPY
6.5.4-6.5.5FP1, 7.0-9.0.1FP8
12
ENGLISHMANSDENTISTExploitOUTLOOK EXCHANGE WEBACCESS(TCP 80) HTTP/(TCP 443) HTTPS
< Exchange 2010?
13
EPICHEROExploitAVAYA CALL SERVER
14
ERRATICGOPHERExploitDCE-RPC MIBEntryGet
http://download.saintcorporation.com/cgi-bin/exploit_info/windows_mibentryget_erraticgopher
(TCP 445) SMBYY
15
ESKIMOROLLExploitKERBEROS SERVICECVE-2014-6324MS14-068(TCP 88) KERBEROSYYYY
16
ESTEEMAUDITExploitRDPCVE-2017-0176(TCP 3389) RDPYY
17
ETERNALCHAMPIONExploitSMBv1/SMBv2?CVE-2017-0146, CVE-2017-0147MS17-010 (targeulletin desc)(TCP 445) SMBYYYYYYYYYYY?
18
ETERNALROMANCEExploitSMBv1
MS17-010 (targets based on CVE and MS bulletin desc) Utilizes extra byte parameters of Trans Secondary Request to place shellcode
MS17-010 (targets based on CVE and MS bulletin desc) Utilizes extra byte parameters of Trans Secondary Request to place shellcode
YYYYY?Y?YYY?Y?
19
ETERNALSYNERGYExploitSMBv3MS17-010 (targets based on CVE and MS bulletin desc)(TCP 445) SMBYY?Y?YYY?smb
20
ETERNALBLUEExploitSMBv1+SMBv2/NBT
CVE-2017-014{3,4,5,6,8}? CVE-2017-0145?
MS17-010 (targets based on CVE and MS bulletin desc)(TCP 445) SMBYYYY?YYYY?Y?
21
ETREExploitIMAIL
8.10-8.22
22
EWOKFRENZYExploitLOTUS DOMINOCVE-2007-1675ZDI-07-011(TCP 143) IMAP
6.5.4, 7.0.2
23
EXPLODINGCANExploitIIS5.0?/6.0 (WEBDAV)CVE-2017-7269(TCP 80) HTTP/(TCP 443) HTTPS5.0?,6.0Y
24
FUZZBUNCHToolFRAMEWORK (PYTHON)
25
ODDJOBToolIMPLANT BUILDER
26
ZIPPYBEERExploitSMBDCs(TCP 445) SMBY
27
28
29
30
The next time this sheet is modified without good reason, it will go Private! :-(
31
32
Sorry bro, just thought if u wrote in english, why to mix up russian and english.. fixed that one up
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
1
94
2
95
3
96
4
97
5
98
6
99
7
100
8
Loading...
 
 
 
Shadow Brokers Exploit Reference Table v0.3.1 by @etlow
Copy of Shadow Brokers Exploit Reference Table v0.3.1 by @etlow
Sheet1