When making exploits targeting Windows Servers, there are times where it would be beneficial to server payloads via SMB. One recent example was a chain of CVE-2025-40536 + CVE-2025-40551 against SolarWinds Web Help Desk to achieve auth bypass and RCE. Stephen Fewer did a great job on this Metasploit module, https://github.com/rapid7/metasploit-framework/pull/20917/changes, loading a malicious DLL via SMB. Go-exploit doesn't currently support serving files via SMB, only via HTTP. This issue is for adding SMB support.
When making exploits targeting Windows Servers, there are times where it would be beneficial to server payloads via SMB. One recent example was a chain of CVE-2025-40536 + CVE-2025-40551 against SolarWinds Web Help Desk to achieve auth bypass and RCE. Stephen Fewer did a great job on this Metasploit module, https://github.com/rapid7/metasploit-framework/pull/20917/changes, loading a malicious DLL via SMB. Go-exploit doesn't currently support serving files via SMB, only via HTTP. This issue is for adding SMB support.