#

cve-2021-1675

https://static.github-zh.com/github_avatars/BeetleChunks?size=40

A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.

Python 555
4 年前
https://static.github-zh.com/github_avatars/hlldz?size=40
C 332
4 年前
https://static.github-zh.com/github_avatars/ly4k?size=40

Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)

Python 198
4 年前
https://static.github-zh.com/github_avatars/nemo-wq?size=40

PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits

C 154
4 年前
https://static.github-zh.com/github_avatars/evilashz?size=40

PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527

C++ 59
4 年前
https://static.github-zh.com/github_avatars/B34MR?size=40

Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and SMBv2 Signing.

Python 13
3 年前
https://static.github-zh.com/github_avatars/Leonidus0x10?size=40
Python 10
4 年前
https://static.github-zh.com/github_avatars/Tomparte?size=40

To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)

PowerShell 3
4 年前
https://static.github-zh.com/github_avatars/DenizSe?size=40

Small Powershell Script to detect Running Printer Spoolers on Domain Controller

PowerShell 0
4 年前
Website
Wikipedia