CVE-2021-1675 Detection Info
☆215May 20, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2021-1675
Users that are interested in CVE-2021-1675 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆326Jul 5, 2021Updated 4 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,980Jul 20, 2021Updated 4 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801May 19, 2024Updated last year
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆823Jul 26, 2021Updated 4 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,099Jul 5, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆874Mar 20, 2023Updated 3 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆211Jan 16, 2022Updated 4 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- A centralized resource for previously documented WDAC bypass techniques☆619Sep 8, 2025Updated 8 months ago
- ☆344Sep 13, 2021Updated 4 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- ☆40Jul 29, 2021Updated 4 years ago
- "Golden" certificates☆717Aug 17, 2024Updated last year
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆449Oct 19, 2022Updated 3 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆224Dec 5, 2020Updated 5 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Sep 16, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆931Feb 28, 2024Updated 2 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,229Aug 15, 2024Updated last year
- C# Lsass parser☆297Oct 13, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- Retrieve LAPS password from LDAP☆442Feb 17, 2021Updated 5 years ago
- Get file less command execution for lateral movement.☆637Jun 3, 2022Updated 3 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆333Oct 9, 2021Updated 4 years ago
- ☆297Jul 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆823Dec 14, 2023Updated 2 years ago
- ☆128May 22, 2023Updated 2 years ago
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆825Oct 11, 2023Updated 2 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆146Sep 4, 2021Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆143Sep 29, 2021Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago