This vulnerability mainly affects Windows Server 2012/2016, Win8 / 8.1 and Win10 systems. An attacker could be modeled as an SMB server to induce a client to initiate an SMB request to trigger a vulnerability. Attackers can also "poison" SMB responses by middlemen, insert malicious SMB replies to achieve denial of service or control victim systems #how to use : python win10.py from('192.168.1.2',8080 ) whaterver the target ip and port : :::::::::::::::::::::::::::::::::::::::::::::::::::: :::::::::::::::::::::::::::::::::::::::::::::::::::::
::mrsentdex ::
:: mostafa mahmoud hasseib::
::Don’t use it on any device without prior permission of device owner::