blackorbird / PrintNightmareLinks
☆52Updated 4 years ago
Alternatives and similar repositories for PrintNightmare
Users that are interested in PrintNightmare are comparing it to the libraries listed below
Sorting:
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- POC for NetworkService PrivEsc☆126Updated 5 years ago
- Proof-of-concept code for various bugs☆110Updated last year
- ☆269Updated 2 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- ☆170Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- ☆71Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆131Updated 2 years ago
- Privilege Escalation Via RpcSs svc☆181Updated 3 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆156Updated 5 years ago
- Windows MSI Installer LPE (CVE-2021-43883)☆79Updated 3 years ago
- Loads a custom dll in system32 via diaghub.☆80Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Updated 5 years ago
- ☆38Updated 5 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆267Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Simple DLL that add a user to the local Administrators group☆78Updated 3 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆133Updated 3 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Updated 5 years ago
- Shellcode injection POC using syscalls.☆117Updated 5 years ago
- ☆63Updated 3 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 6 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago