PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits
☆167Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for PrintNightmare-CVE-2021-34527
Users that are interested in PrintNightmare-CVE-2021-34527 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PrintNightmare (CVE-2021-34527) PoC Exploit☆119Dec 17, 2022Updated 3 years ago
- ☆35May 31, 2023Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆151Nov 22, 2023Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆136Oct 8, 2021Updated 4 years ago
- ☆310Jul 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆344Mar 30, 2022Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Windows Privilege Escalation☆74Jun 7, 2022Updated 3 years ago
- Various Cobalt Strike BOFs☆746Oct 16, 2022Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆949Nov 12, 2022Updated 3 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,097Jul 5, 2021Updated 4 years ago
- ☆344Sep 13, 2021Updated 4 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆793Feb 9, 2022Updated 4 years ago
- Windows AppLocker Driver (appid.sys) LPE☆76Jul 29, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆323Jan 13, 2023Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,164Jan 9, 2021Updated 5 years ago
- TartarusGate, Bypassing EDRs☆658Jan 25, 2022Updated 4 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆394Nov 5, 2020Updated 5 years ago
- A tool to help query AD via the LDAP protocol☆614Sep 25, 2024Updated last year
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,398Dec 16, 2021Updated 4 years ago
- ☆832Sep 9, 2022Updated 3 years ago
- Python implementation for PetitPotam☆222Oct 17, 2021Updated 4 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆438Jul 29, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆56Sep 13, 2022Updated 3 years ago
- ☆100Sep 1, 2024Updated last year
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- Windows Local Privilege Escalation from Service Account to System☆925Feb 23, 2020Updated 6 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,100May 29, 2024Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,055Jan 23, 2020Updated 6 years ago
- .NET Project for performing Authenticated Remote Execution☆405Feb 8, 2023Updated 3 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆279Apr 17, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆623Aug 15, 2025Updated 7 months ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆819Dec 14, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆983Jan 29, 2023Updated 3 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆969Dec 29, 2017Updated 8 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,453Dec 18, 2022Updated 3 years ago