nemo-wq / PrintNightmare-CVE-2021-34527
PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits
☆139Updated 3 years ago
Alternatives and similar repositories for PrintNightmare-CVE-2021-34527:
Users that are interested in PrintNightmare-CVE-2021-34527 are comparing it to the libraries listed below
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆186Updated 3 years ago
- Proof-of-concept tools for my AD Forest trust research☆205Updated 9 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- XLL Phishing Tradecraft☆413Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆287Updated 3 years ago
- Bypass AMSI by patching AmsiScanBuffer☆259Updated 3 years ago
- SeRestorePrivilege to SYSTEM☆95Updated 3 years ago
- ☆365Updated 3 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆311Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆182Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- Collection of remote authentication triggers in C#☆477Updated 10 months ago
- ☆509Updated 3 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆272Updated 3 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆265Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆173Updated last month
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆299Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆333Updated 2 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆218Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆204Updated last week
- A User Impersonation tool - via Token or Shellcode injection☆411Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- Shellcode launcher for AV bypass☆216Updated last year
- Simple reverse shell to avoid Win 11 defender detection☆118Updated 3 years ago
- C# Lsass parser☆289Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆155Updated last year
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆208Updated 3 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆417Updated 2 months ago
- Pass the Hash to a named pipe for token Impersonation☆301Updated last year
- Partial python implementation of SharpGPOAbuse☆406Updated last year