CVE-2020-1472
EPSS Score
Source: FIRST.org · 2026-05-23CVSS v3.1
Source: VulnerabilityLookup (CIRCL)CVSS v2 (legacy)
Description
NVDAffected Products
Exploits & PoC
Test tool for CVE-2020-1472
PoC for Zerologon - all research credits go to Tom Tervoort of Secura
Exploit for zerologon cve-2020-1472
Exploit Code for CVE-2020-1472 aka Zerologon
Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.
cve-2020-1472 复现利用及其exp
CVE-2020-1472 C++
Test script for CVE-2020-1472 for both RPC/TCP and RPC/SMB
Ladon Moudle CVE-2020-1472 Exploit 域控提权神器
Zerologon AutoExploit Tool | CVE-2020-1472
Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check, expl
POC for checking multiple hosts for Zerologon vulnerability
Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and SMBv2 Signing.
CVE-2020-1472复现时使用的py文件整理打包
PoC for Zerologon (CVE-2020-1472) - Exploit
quick'n'dirty automated checks for potential exploitation of CVE-2020-1472 (aka ZeroLogon), using leading artifects in determining an actual exploitat
C# Vulnerability Checker for CVE-2020-1472 Aka Zerologon
CVE-2020-1472复现流程
Tool for mass testing ZeroLogon vulnerability CVE-2020-1472
CVE-2020-1472漏洞复现过程
CVE-2020-1472 - Zero Logon vulnerability Python implementation
cve-2020-1472_Tool collection
Protect your domain controllers against Zerologon (CVE-2020-1472).
zerologon script to exploit CVE-2020-1472 CVSS 10/10
Zerologon (CVE-2020-1472) Proof-of-Concept application - Critical Active Directory vulnerability exploitation tool.
CVE-2020-1472
Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event I
[CVE-2020-1472] Netlogon Remote Protocol Call (MS-NRPC) Privilege Escalation (Zerologon)
https://github.com/dirkjanm/CVE-2020-1472
A simple implementation/code smash of a bunch of other repos
Modified the test PoC from Secura, CVE-2020-1472, to change the machine password to null
Exploit Code for CVE-2020-1472 aka Zerologon
Zero-day-scanning is a Domain Controller vulnerability scanner, that currently includes checks for Zero-day-scanning (CVE-2020-1472), MS-PAR/MS-RPRN a
CVE 2020-1472 Script de validación
CVE-2020-1472
Check for events that indicate non compatible devices -> CVE-2020-1472
The following is the outcome of playing with CVE-2020-1472 and attempting to automate the process of gaining a shell on the DC
Test tool for CVE-2020-1472
Set of scripts, to test and exploit the zerologon vulnerability (CVE-2020-1472).
Tool for mass testing ZeroLogon vulnerability CVE-2020-1472
This is a combination of the zerologon_tester.py code (https://raw.githubusercontent.com/SecuraBV/CVE-2020-1472/master/zerologon_tester.py) and the to
MS-NRPC (Microsoft NetLogon Remote Protocol)/CVE-2020-1472
Lab introduction to ZeroLogon
A script to exploit CVE-2020-1472 (Zerologon)
A practical proof-of-concept for CVE-2020-1472 (Zerologon) using the Impacket library to exploit Netlogon vulnerability and perform unauthorized domai
Simulation of the Zerologon (CVE-2020-1472) vulnerability attack in Active Directory on Windows Server 2016 and the use of the Trend Micro Deep Securi
Explicação e demonstração da vulnerabilidade ZeroLogon (CVE-2020-1472)
End-to-end Domain Controller exploitation using Metasploit and Impacket: discovered DC10, exploited Zerologon (CVE-2020-1472), extracted NTLM hashes,
Scripts for a lab environment demonstrating the Zerologon (CVE-2020-1472) vulnerability.
Advanced AD Offensive Engine. Automates the path from stealthy recon to domain compromise. Features unauthenticated SMB Signing/NTLM Relay audits, Zer