Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)
☆207Oct 17, 2021Updated 4 years ago
Alternatives and similar repositories for PrintNightmare
Users that are interested in PrintNightmare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python implementation for PetitPotam☆222Oct 17, 2021Updated 4 years ago
- ☆344Sep 13, 2021Updated 4 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Jan 13, 2022Updated 4 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- ADCS abuser☆317Feb 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆792Feb 9, 2022Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- Framework for Kerberos relaying☆943May 29, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆379Dec 26, 2022Updated 3 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆416Jan 27, 2024Updated 2 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,048Jul 10, 2022Updated 3 years ago
- ☆384Aug 19, 2021Updated 4 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆381Dec 23, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆342Oct 17, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆872Mar 20, 2023Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆387Oct 27, 2024Updated last year
- The swiss army knife of LSASS dumping☆2,086Sep 17, 2024Updated last year
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆120Dec 17, 2022Updated 3 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,637Aug 6, 2022Updated 3 years ago
- ☆11Jun 26, 2024Updated last year
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆936Nov 11, 2024Updated last year
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,977Jul 20, 2021Updated 4 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 4 months ago
- Tools for Kerberos PKINIT and relaying to AD CS☆891Jan 3, 2025Updated last year
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆598Jan 31, 2025Updated last year
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆414Nov 10, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 5 months ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆156Aug 3, 2022Updated 3 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated 2 weeks ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆906Updated this week
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆480Nov 11, 2021Updated 4 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆942Jul 26, 2021Updated 4 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆737Sep 3, 2025Updated 7 months ago