m8sec / CVE-2021-34527
PrintNightmare (CVE-2021-34527) PoC Exploit
☆107Updated 2 years ago
Alternatives and similar repositories for CVE-2021-34527:
Users that are interested in CVE-2021-34527 are comparing it to the libraries listed below
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- ☆116Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆69Updated 7 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆127Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆178Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆121Updated last year
- ☆88Updated 2 years ago
- ☆55Updated 11 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- ACL abuse swiss-knife☆119Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆99Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Powershell version of SharpGPOAbuse☆75Updated 3 years ago
- SeRestorePrivilege to SYSTEM☆95Updated 3 years ago
- Windows Privilege Escalation☆56Updated 2 years ago
- AV EVASION TECHNIQUES☆77Updated 2 years ago
- ☆161Updated 7 months ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Shellcode generation and encoding utility☆21Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆102Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year