nemo-wq / PrintNightmare-CVE-2021-34527View external linksLinks
PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits
☆164Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for PrintNightmare-CVE-2021-34527
Users that are interested in PrintNightmare-CVE-2021-34527 are comparing it to the libraries listed below
Sorting:
- PrintNightmare (CVE-2021-34527) PoC Exploit☆119Dec 17, 2022Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆146Nov 22, 2023Updated 2 years ago
- ☆35May 31, 2023Updated 2 years ago
- ☆303Jul 2, 2021Updated 4 years ago
- SeRestorePrivilege to SYSTEM☆133Oct 8, 2021Updated 4 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆339Mar 30, 2022Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆938Nov 12, 2022Updated 3 years ago
- ☆55Sep 13, 2022Updated 3 years ago
- Various Cobalt Strike BOFs☆736Oct 16, 2022Updated 3 years ago
- Windows Privilege Escalation☆70Jun 7, 2022Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆797Feb 9, 2022Updated 4 years ago
- ☆345Sep 13, 2021Updated 4 years ago
- Python implementation for PetitPotam☆219Oct 17, 2021Updated 4 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,148Jan 9, 2021Updated 5 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,088Jul 5, 2021Updated 4 years ago
- TartarusGate, Bypassing EDRs☆651Jan 25, 2022Updated 4 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,085May 29, 2024Updated last year
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- Windows AppLocker Driver (appid.sys) LPE☆74Jul 29, 2024Updated last year
- ☆322Jan 13, 2023Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- Windows Local Privilege Escalation from Service Account to System☆914Feb 23, 2020Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆610Aug 15, 2025Updated 6 months ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆817Dec 14, 2023Updated 2 years ago
- ☆827Sep 9, 2022Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,040Jul 10, 2022Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆236Jan 28, 2022Updated 4 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆453Mar 30, 2023Updated 2 years ago
- .NET Project for performing Authenticated Remote Execution☆406Feb 8, 2023Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆22Sep 4, 2021Updated 4 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Performing Indirect Clean Syscalls☆603Apr 19, 2023Updated 2 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆973Jan 29, 2023Updated 3 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆338Oct 17, 2022Updated 3 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆968Dec 29, 2017Updated 8 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,052Jan 23, 2020Updated 6 years ago