m8sec / CVE-2021-34527View external linksLinks
PrintNightmare (CVE-2021-34527) PoC Exploit
☆119Dec 17, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2021-34527
Users that are interested in CVE-2021-34527 are comparing it to the libraries listed below
Sorting:
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆164Sep 13, 2021Updated 4 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- Exploit for CVE-2022-30206☆76Sep 25, 2022Updated 3 years ago
- Roast in the Middle☆295Sep 19, 2025Updated 4 months ago
- ☆539Nov 20, 2021Updated 4 years ago
- ☆827Sep 9, 2022Updated 3 years ago
- ☆163Dec 30, 2022Updated 3 years ago
- ☆43Jan 2, 2023Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆938Nov 12, 2022Updated 3 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆540Nov 23, 2025Updated 2 months ago
- The Token Stealer☆510Jul 13, 2022Updated 3 years ago
- ☆49Feb 11, 2023Updated 3 years ago
- Python implementation for PetitPotam☆218Oct 17, 2021Updated 4 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 10 months ago
- In-memory token vault BOF for Cobalt Strike☆149Aug 18, 2022Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆206Oct 17, 2021Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Oct 27, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆973Jan 29, 2023Updated 3 years ago
- ☆322Jan 13, 2023Updated 3 years ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Jun 18, 2022Updated 3 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆339Mar 30, 2022Updated 3 years ago
- A tiny Reverse Sock5 Proxy written in C :V☆315Nov 28, 2022Updated 3 years ago
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆415Nov 10, 2024Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 4 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆629Oct 19, 2023Updated 2 years ago
- Stage 0☆169Dec 18, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆224Nov 23, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆669Oct 23, 2025Updated 3 months ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Sep 15, 2022Updated 3 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆281Feb 24, 2025Updated 11 months ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- ☆35May 31, 2023Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago