Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)
☆208Oct 17, 2021Updated 4 years ago
Alternatives and similar repositories for PrintNightmare
Users that are interested in PrintNightmare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python implementation for PetitPotam☆223Oct 17, 2021Updated 4 years ago
- ☆344Sep 13, 2021Updated 4 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆276Jan 13, 2022Updated 4 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- ADCS abuser☆319Feb 6, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆795Feb 9, 2022Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- Framework for Kerberos relaying☆946May 29, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆384Dec 26, 2022Updated 3 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆419Jan 27, 2024Updated 2 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,054Jul 10, 2022Updated 3 years ago
- ☆385Aug 19, 2021Updated 4 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆383Dec 23, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆344Oct 17, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆874Mar 20, 2023Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆387Oct 27, 2024Updated last year
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆120Dec 17, 2022Updated 3 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801May 19, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,639Aug 6, 2022Updated 3 years ago
- ☆11Jun 26, 2024Updated last year
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆943Nov 11, 2024Updated last year
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,979Jul 20, 2021Updated 4 years ago
- C# Port of LdapRelayScan☆92Nov 26, 2025Updated 5 months ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆598Jan 31, 2025Updated last year
- Tools for Kerberos PKINIT and relaying to AD CS☆896Jan 3, 2025Updated last year
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆416Nov 10, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆157Nov 2, 2025Updated 6 months ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆157Aug 3, 2022Updated 3 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆307Mar 28, 2026Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆912Apr 24, 2026Updated last week
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆481Nov 11, 2021Updated 4 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆948Jul 26, 2021Updated 4 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆739Sep 3, 2025Updated 7 months ago