mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
20 KiB
20 KiB
CVE-2021-1675
Description
Windows Print Spooler Remote Code Execution Vulnerability
POC
Reference
- http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html
- http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
Github
- https://github.com/000Tonio/cve-2021-1675
- https://github.com/0housefly0/Printnightmare
- https://github.com/0x727/usefull-elevation-of-privilege
- https://github.com/0x7n6/OSCP
- https://github.com/0xHunterr/OSCP-Study-Notes
- https://github.com/0xHunterr/OSCP-Studying-Notes
- https://github.com/0xMarcio/cve
- https://github.com/0xSs0rZ/Windows_Exploit
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xaniketB/HackTheBox-Driver
- https://github.com/0xffee/Layer2HackerDao
- https://github.com/0xsyr0/OSCP
- https://github.com/20142995/sectool
- https://github.com/3gstudent/Invoke-BuildAnonymousSMBServer
- https://github.com/410g0n3/Active-Directory-Cheatsheet-Attacks
- https://github.com/4RG0S/2021-Summer-Some-Day-Exploit
- https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler
- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1
- https://github.com/61106960/ClipySharpPack
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AbdullahZuhair21/OSCP-Notes
- https://github.com/Aesir9/helpinghand
- https://github.com/AleHelp/Windows-Pentesting-cheatsheet
- https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/AndrewTrube/CVE-2021-1675
- https://github.com/Andromeda254/cve
- https://github.com/Anonymous-Family/Zero-day-scanning
- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/B34MR/zeroscan
- https://github.com/BADR0b0t33/PrintAttck
- https://github.com/BC-SECURITY/Moriarty
- https://github.com/BOFs/CobaltStrike
- https://github.com/BeetleChunks/SpoolSploit
- https://github.com/CPester05/Exploits
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CharlesTheGreat77/FreddyKrueger
- https://github.com/CnOxx1/CVE-2021-34527-1675
- https://github.com/Cyberappy/Sigma-rules
- https://github.com/D3Ext/PentestDictionary
- https://github.com/DARKSTUFF-LAB/SpoolSploit
- https://github.com/DLL00P/CVE-2021-1675
- https://github.com/DanielBodnar/awesome-stars
- https://github.com/DanielBodnar/my-awesome-stars
- https://github.com/DenizSe/CVE-2021-34527
- https://github.com/Dr4ks/PJPT_CheatSheet
- https://github.com/EASI-Sec/EasiWeapons.sh
- https://github.com/EnriqueSanchezdelVillar/NotesHck
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/Falcon712/Windows_Hardening_Project
- https://github.com/G0urmetD/PJPT-Notes
- https://github.com/Getshell/CobaltStrike
- https://github.com/GhostTroops/TOP
- https://github.com/GlacierGossip/PrintNightmare
- https://github.com/Gyarbij/xknow_infosec
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/HackingCost/AD_Pentest
- https://github.com/HarshRajSinghania/smbvulnrecon
- https://github.com/Hatcat123/my_stars
- https://github.com/Iveco/xknow_infosec
- https://github.com/JERRY123S/all-poc
- https://github.com/JFR-C/Boot2root-CTFs-Writeups
- https://github.com/JFR-C/Windows-Penetration-Testing
- https://github.com/Jalexander798/JA_Tools-0xsp-Mongoose
- https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/JohnHammond/CVE-2021-34527
- https://github.com/JumpsecLabs/PrintNightmare
- https://github.com/Kar0nX/ADtools
- https://github.com/Kryo1/Pentest_Note
- https://github.com/LaresLLC/CVE-2021-1675
- https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER
- https://github.com/Ly0nt4r/OSCP
- https://github.com/MGamalCYSEC/Active-Directory-Enumeration-and-Attacks
- https://github.com/Mehedi-Babu/active_directory_chtsht
- https://github.com/Mikasazero/Cobalt-Strike
- https://github.com/MizaruIT/PENTAD-TOOLKIT
- https://github.com/MizaruIT/PENTADAY_TOOLKIT
- https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/MolotovC2/arsenal
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/NickSanzotta/zeroscan
- https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/Qazeer/OffensivePythonPipeline
- https://github.com/RarW0lf/PrintNightmare-BB-Payload
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories
- https://github.com/S3cur3Th1sSh1t/PowerSharpPack
- https://github.com/S3cur3Th1sSh1t/WinPwn
- https://github.com/SYRTI/POC_to_review
- https://github.com/SafeItConsulting/WinTools
- https://github.com/SaintsConnor/Exploits
- https://github.com/SantoriuHen/NotesHck
- https://github.com/SecuProject/NetworkInfoGather
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SexurityAnalyst/WinPwn
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SirElmard/ethical_hacking
- https://github.com/SofianeHamlaoui/Conti-Clear
- https://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675
- https://github.com/Steels03/PrintNightmare-Driver-Checker
- https://github.com/T0mcat3r/ALinks
- https://github.com/TheCyberFang/website
- https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675
- https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675
- https://github.com/TheLastochka/pentest
- https://github.com/TheWatchDog13/PJPT-Cheat_Sheet
- https://github.com/Threekiii/Awesome-Redteam
- https://github.com/TirthSharaf/Internal-Pentest-cheat-sheet
- https://github.com/Tomparte/PrintNightmare
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/VK9D/PrintNightmare
- https://github.com/ViniciusClement/OSCP_2025
- https://github.com/VishuGahlyan/OSCP
- https://github.com/VoiidByte/Impacket
- https://github.com/WatPow/anadoc
- https://github.com/WhooAmii/POC_to_review
- https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation
- https://github.com/Winter3un/CVE-2021-1675
- https://github.com/Wra7h/SharpPN
- https://github.com/X-3306/my-all-notes
- https://github.com/X-The-Mystic/xframe
- https://github.com/YangSirrr/YangsirStudyPlan
- https://github.com/aatharvauti/AD
- https://github.com/abdullah89255/Metasploit-Framework-
- https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database
- https://github.com/afine-com/research
- https://github.com/afinepl/research
- https://github.com/akyuksel/tryhackme-all-rooms-database
- https://github.com/alvesnet-oficial/microsoft-vulnerabilidades
- https://github.com/alvesnet-suporte/microsoft-vulnerabilidades
- https://github.com/angui0O/Awesome-Redteam
- https://github.com/arifhidayat65/PrintNightmare
- https://github.com/auduongxuan/CVE-2022-26809
- https://github.com/aymankhder/AD-esploitation-cheatsheet
- https://github.com/aymankhder/Windows-Penetration-Testing
- https://github.com/b4rtik/SharpKatz
- https://github.com/bartimus-primed/CVE-2021-1675-Yara
- https://github.com/bartimusprimed/CVE-2021-1675-Yara
- https://github.com/bhassani/Recent-CVE
- https://github.com/binganao/vulns-2022
- https://github.com/boh/RedCsharp
- https://github.com/brimstone/stars
- https://github.com/byt3bl33d3r/ItWasAllADream
- https://github.com/calebstewart/CVE-2021-1675
- https://github.com/cfalta/MicrosoftWontFixList
- https://github.com/chosenonehacks/Red-Team-tools-and-usefull-links
- https://github.com/ciwen3/PNPT
- https://github.com/clearbluejar/cve-markdown-charts
- https://github.com/corelight/CVE-2021-1675
- https://github.com/crimsoncore/SharpKatz
- https://github.com/crtaylor315/PrintNightmare-Before-Halloween
- https://github.com/csb21jb/Pentesting-Notes
- https://github.com/cube0x0/CVE-2021-1675
- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/cyb3rpeace/CVE-2021-34527
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/cyberfreaq/configs
- https://github.com/cyberfreaq/kali-prep
- https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare
- https://github.com/cycoslave/ITSec-toolkit
- https://github.com/d0nkeyk0ng787/PrintNightmare-POC
- https://github.com/danielbodnar/my-awesome-stars
- https://github.com/demilson/spoolsv
- https://github.com/devkw/PentestDictionary
- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/dxnboy/redteam
- https://github.com/e-hakson/OSCP
- https://github.com/edisonrivera/HackTheBox
- https://github.com/edsonjt81/CVE-2021-1675
- https://github.com/edsonjt81/SpoolSploit
- https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/elinakrmova/WinPwn
- https://github.com/eljosep/OSCP-Guide
- https://github.com/emtee40/win-pwn
- https://github.com/eng-amarante/CyberSecurity
- https://github.com/eversinc33/NimNightmare
- https://github.com/evilashz/CVE-2021-1675-LPE-EXP
- https://github.com/exfilt/CheatSheet
- https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675
- https://github.com/f4T1H21/HackTheBox-Writeups
- https://github.com/fazilbaig1/oscp
- https://github.com/fei9747/Awesome-CobaltStrike
- https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527
- https://github.com/gecr07/HTB-Academy
- https://github.com/getanehAl/Windows-Penetration-Testing
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler
- https://github.com/goldenscale/GS_GithubMirror
- https://github.com/gyaansastra/Print-Nightmare-LPE
- https://github.com/hack-parthsharma/RedTeam-Cheetsheet
- https://github.com/hack-parthsharma/WinPwn
- https://github.com/hahaleyile/my-CVE-2021-1675
- https://github.com/hegusung/netscan
- https://github.com/hktalent/TOP
- https://github.com/hlldz/CVE-2021-1675-LPE
- https://github.com/huike007/penetration_poc
- https://github.com/huisetiankong478/penetration_poc
- https://github.com/iamramahibrah/AD-Attacks-and-Defend
- https://github.com/initconf/cve-2021-1675-printnightmare
- https://github.com/izj007/wechat
- https://github.com/jbmihoub/all-poc
- https://github.com/jenriquezv/OSCP-Cheat-Sheets-AD
- https://github.com/jitmondal1/OSCP
- https://github.com/jj4152/cve-2021-1675
- https://github.com/jor6PS/ad-from-0-to-Hero
- https://github.com/k0imet/CVE-POCs
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/k8gege/CVE-2021-40444
- https://github.com/k8gege/Ladon
- https://github.com/k8gege/cve-2021-1675
- https://github.com/kdandy/WinPwn
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
- https://github.com/killtr0/CVE-2021-1675-PrintNightmare
- https://github.com/kondah/patch-cve-2021-1675
- https://github.com/kougyokugentou/CVE-2021-1675
- https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest
- https://github.com/lawbyte/Windows-and-Active-Directory
- https://github.com/lawrenceamer/0xsp-Mongoose
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lvoxpq/aaaxxqqq
- https://github.com/ly4k/PrintNightmare
- https://github.com/lyshark/Windows-exploits
- https://github.com/m8sec/CVE-2021-34527
- https://github.com/mahdictf/PrivEsc-Techniques
- https://github.com/malwaremily/infosec-news-briefs
- https://github.com/manas3c/CVE-POC
- https://github.com/mayormaier/printnightmare-fixes
- https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack
- https://github.com/mdecrevoisier/SIGMA-detection-rules
- https://github.com/melons135/DagdaBins
- https://github.com/merlinepedra/CobaltStrike
- https://github.com/merlinepedra/POWERSHARPPACK
- https://github.com/merlinepedra/SpoolSploit
- https://github.com/merlinepedra25/CobaltStrike
- https://github.com/merlinepedra25/POWERSHARPPACK
- https://github.com/merlinepedra25/SpoolSploit
- https://github.com/morkin1792/security-tests
- https://github.com/mranv/adPentest
- https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery
- https://github.com/mstxq17/CVE-2021-1675_RDL_LPE
- https://github.com/mxdelta/Up_Privel_windows
- https://github.com/n0-traces/cve_monitor
- https://github.com/n0rmh3ll/AD-checklist
- https://github.com/n1sh1th/CVE-POC
- https://github.com/nathanealm/PrintNightmare-Exploit
- https://github.com/naujpr/printnightmare
- https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
- https://github.com/netkid123/WinPwn-1
- https://github.com/nholuongut/active-directory-exploitation-cheat-sheet
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nullx3d/PaypScan
- https://github.com/numanturle/PrintNightmare
- https://github.com/orgTestCodacy11KRepos110MB/repo-9265-PowerSharpPack
- https://github.com/oscpname/AD_PowerSharpPack
- https://github.com/oscpname/OSCP_cheat
- https://github.com/outflanknl/PrintNightmare
- https://github.com/ozergoker/PrintNightmare
- https://github.com/ozzy76/cveCheck
- https://github.com/parth45/cheatsheet
- https://github.com/peckre/PNCVE-Win10-20H2-Exploit
- https://github.com/penetrarnya-tm/WeaponizeKali.sh
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/ptter23/CVE-2021-1675
- https://github.com/puckiestyle/CVE-2021-1675
- https://github.com/pwninx/WinPwn
- https://github.com/pwnlog/ALinks
- https://github.com/pwnlog/PAD
- https://github.com/pwnlog/PuroAD
- https://github.com/pwnlog/PurpAD
- https://github.com/r1skkam/PrintNightmare
- https://github.com/raithedavion/PrintNightmare
- https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/real-acmkan/docker-printernightmare
- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/retr0-13/PrintNightmare
- https://github.com/retr0-13/WinPwn
- https://github.com/rettbl/Useful
- https://github.com/revanmalang/OSCP
- https://github.com/rnbochsr/atlas
- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG
- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/s3mPr1linux/JUST_WALKING_DOG
- https://github.com/sabrinalupsan/pentesting-active-directory
- https://github.com/sailay1996/PrintNightmare-LPE
- https://github.com/sardarahmed705/Pentest-Dictionary
- https://github.com/saurav2shukla/vulnerabilitiesPoC
- https://github.com/schecthellraiser606/oscp_cheet
- https://github.com/schecthellraiser606/pentest_cheet
- https://github.com/seeu-inspace/easyg
- https://github.com/sh7alward/CVE-20121-34527-nightmare
- https://github.com/shadowdevnotreal/Awesome-CobaltStrike
- https://github.com/sinfulz/JustGetDA
- https://github.com/snovvcrash/WeaponizeKali.sh
- https://github.com/soosmile/POC
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/strikoder/CTFS
- https://github.com/suljov/Windows-and-Active-Directory
- https://github.com/suljov/Windwos-and-Active-Directory
- https://github.com/suljov/suljov-Pentest-ctf-cheat-sheet
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tanarchytan/CVE-2021-1675
- https://github.com/thalpius/Microsoft-CVE-2021-1675
- https://github.com/thomasgeens/CVE-2021-1675
- https://github.com/tomatimmy/AD-attack-enumerate
- https://github.com/trganda/starrlist
- https://github.com/trhacknon/Pocingit
- https://github.com/trixiahorner/printnightmare-try-hack-me
- https://github.com/trixiahorner/trixiahorner
- https://github.com/txuswashere/OSCP
- https://github.com/txuswashere/Pentesting-Windows
- https://github.com/uhub/awesome-c-sharp
- https://github.com/uk32htb/Active-Directory
- https://github.com/undefined-name12/Cheat-Sheet-Active-Directory
- https://github.com/vanhohen/ADNinja
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-
- https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527
- https://github.com/whoami13apt/files2
- https://github.com/whoforget/CVE-POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wlfrag/printnightmare
- https://github.com/wowter-code/PowerSharpPack
- https://github.com/wsummerhill/CobaltStrike_RedTeam_CheatSheet
- https://github.com/xbufu/PrintNightmareCheck
- https://github.com/xhref/OSCP
- https://github.com/xthemystik/xframe
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yerdaulete/PJPT-CheatSheet
- https://github.com/yigitturak/Forensics
- https://github.com/youwizard/CVE-POC
- https://github.com/yovelo98/OSCP-Cheatsheet
- https://github.com/yu2u/CVE-2021-1675
- https://github.com/zecool/cve
- https://github.com/zer0yu/Awesome-CobaltStrike
- https://github.com/zeze-zeze/2021iThome
- https://github.com/zha0/Microsoft-CVE-2021-1675
- https://github.com/zux0x3a/0xsp-Mongoose