nathanealm / PrintNightmare-ExploitLinks
☆31Updated 2 years ago
Alternatives and similar repositories for PrintNightmare-Exploit
Users that are interested in PrintNightmare-Exploit are comparing it to the libraries listed below
Sorting:
- Windows Privilege Escalation☆69Updated 3 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- SeRestorePrivilege to SYSTEM☆129Updated 4 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆41Updated 9 months ago
- ☆109Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆76Updated last year
- ☆43Updated last month
- PowerShell script to generate ShellCode in various formats☆44Updated last year
- ☆86Updated 6 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆159Updated 4 years ago
- A command and control framework.☆55Updated 11 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Updated 3 years ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆62Updated 6 months ago
- Active Directory Authentication Library☆84Updated 3 weeks ago
- ☆45Updated last month
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆42Updated 3 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆56Updated last year
- ☆59Updated last year
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆100Updated 5 months ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- Simple HTTP async comms using standard GET/POST requests☆42Updated last month
- Proof Of Concepts☆54Updated 4 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆45Updated 3 months ago
- Abusing SSRF to deliver an authenticated command injection payload☆30Updated 2 months ago
- SeManageVolumePrivilege to SYSTEM☆140Updated 2 years ago
- List of some AD tools I frequently use☆51Updated 3 weeks ago
- C# havoc implant☆101Updated 2 years ago