2023-01-02 13:13:52 +01:00
[
{
"id" : 382645654 ,
"name" : "PrintNightmare-CVE-2021-34527" ,
"full_name" : "nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "nemo-wq" ,
"id" : 28733668 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4" ,
"html_url" : "https:\/\/github.com\/nemo-wq"
} ,
"html_url" : "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"description" : "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits" ,
"fork" : false ,
"created_at" : "2021-07-03T15:15:12Z" ,
2023-05-28 02:28:26 +02:00
"updated_at" : "2023-05-27T20:28:21Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2021-09-13T12:12:17Z" ,
2023-05-28 02:28:26 +02:00
"stargazers_count" : 87 ,
"watchers_count" : 87 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-05-10 20:29:06 +02:00
"forks_count" : 34 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-1675" ,
"cve-2021-34527" ,
"howto-tutorial" ,
"printnightmare" ,
"rce" ,
"windowsexploits"
] ,
"visibility" : "public" ,
2023-05-10 20:29:06 +02:00
"forks" : 34 ,
2023-05-28 02:28:26 +02:00
"watchers" : 87 ,
2023-01-02 13:13:52 +01:00
"score" : 0
} ,
{
"id" : 383254488 ,
"name" : "ItWasAllADream" ,
"full_name" : "byt3bl33d3r\/ItWasAllADream" ,
"owner" : {
"login" : "byt3bl33d3r" ,
"id" : 5151193 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4" ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r"
} ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream" ,
"description" : "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE" ,
"fork" : false ,
"created_at" : "2021-07-05T20:13:49Z" ,
2023-05-27 14:31:02 +02:00
"updated_at" : "2023-05-27T08:18:50Z" ,
2023-01-18 19:35:10 +01:00
"pushed_at" : "2023-01-18T13:58:42Z" ,
2023-05-23 14:31:20 +02:00
"stargazers_count" : 718 ,
"watchers_count" : 718 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-05-20 08:28:34 +02:00
"forks_count" : 115 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-20 08:28:34 +02:00
"forks" : 115 ,
2023-05-23 14:31:20 +02:00
"watchers" : 718 ,
2023-01-02 13:13:52 +01:00
"score" : 0
} ,
{
2023-05-25 08:30:32 +02:00
"id" : 390263988 ,
"name" : "PrintNightmare" ,
"full_name" : "Tomparte\/PrintNightmare" ,
2023-01-02 13:13:52 +01:00
"owner" : {
2023-05-25 08:30:32 +02:00
"login" : "Tomparte" ,
"id" : 88080067 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88080067?v=4" ,
"html_url" : "https:\/\/github.com\/Tomparte"
2023-01-02 13:13:52 +01:00
} ,
2023-05-25 08:30:32 +02:00
"html_url" : "https:\/\/github.com\/Tomparte\/PrintNightmare" ,
"description" : "To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)" ,
2023-01-02 13:13:52 +01:00
"fork" : false ,
2023-05-25 08:30:32 +02:00
"created_at" : "2021-07-28T07:55:42Z" ,
"updated_at" : "2021-09-15T06:40:48Z" ,
"pushed_at" : "2021-08-20T11:41:18Z" ,
2023-01-02 13:13:52 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
2023-05-25 08:30:32 +02:00
"forks_count" : 0 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2023-05-25 08:30:32 +02:00
"topics" : [
"batch-script" ,
"cve-2021-1675" ,
"cve-2021-34527" ,
"cve-2021-36958" ,
"cve-2021-40447" ,
"cybersecurity" ,
"powershell-script" ,
"print" ,
"printnightmare" ,
"security" ,
"spooler" ,
"to-do" ,
"windows"
] ,
2023-01-02 13:13:52 +01:00
"visibility" : "public" ,
2023-05-25 08:30:32 +02:00
"forks" : 0 ,
2023-01-02 13:13:52 +01:00
"watchers" : 3 ,
"score" : 0
} ,
{
"id" : 437822133 ,
"name" : "CVE-2021-34527" ,
"full_name" : "Amaranese\/CVE-2021-34527" ,
"owner" : {
"login" : "Amaranese" ,
"id" : 32201849 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4" ,
"html_url" : "https:\/\/github.com\/Amaranese"
} ,
"html_url" : "https:\/\/github.com\/Amaranese\/CVE-2021-34527" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T10:04:49Z" ,
"updated_at" : "2021-12-13T10:21:38Z" ,
"pushed_at" : "2021-12-13T10:21:35Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 507019653 ,
"name" : "CVE-2021-34527" ,
"full_name" : "cyb3rpeace\/CVE-2021-34527" ,
"owner" : {
"login" : "cyb3rpeace" ,
"id" : 108078112 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/108078112?v=4" ,
"html_url" : "https:\/\/github.com\/cyb3rpeace"
} ,
"html_url" : "https:\/\/github.com\/cyb3rpeace\/CVE-2021-34527" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-06-24T13:25:25Z" ,
"updated_at" : "2022-06-24T13:25:39Z" ,
"pushed_at" : "2022-06-24T13:25:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 528150029 ,
"name" : "CVE-2021-34527" ,
"full_name" : "m8sec\/CVE-2021-34527" ,
"owner" : {
"login" : "m8sec" ,
"id" : 13889819 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/13889819?v=4" ,
"html_url" : "https:\/\/github.com\/m8sec"
} ,
"html_url" : "https:\/\/github.com\/m8sec\/CVE-2021-34527" ,
"description" : "PrintNightmare (CVE-2021-34527) PoC Exploit" ,
"fork" : false ,
"created_at" : "2022-08-23T20:20:45Z" ,
2023-05-27 14:31:02 +02:00
"updated_at" : "2023-05-27T08:19:07Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2022-12-17T16:10:46Z" ,
2023-05-12 14:34:48 +02:00
"stargazers_count" : 72 ,
"watchers_count" : 72 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
2023-05-25 14:29:53 +02:00
"forks_count" : 15 ,
2023-01-07 01:35:14 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-25 14:29:53 +02:00
"forks" : 15 ,
2023-05-12 14:34:48 +02:00
"watchers" : 72 ,
2023-01-07 01:35:14 +01:00
"score" : 0
} ,
{
"id" : 533095208 ,
"name" : "cve-2021-34527" ,
"full_name" : "hackerhouse-opensource\/cve-2021-34527" ,
"owner" : {
"login" : "hackerhouse-opensource" ,
"id" : 43967630 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4" ,
"html_url" : "https:\/\/github.com\/hackerhouse-opensource"
} ,
"html_url" : "https:\/\/github.com\/hackerhouse-opensource\/cve-2021-34527" ,
"description" : "CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation" ,
"fork" : false ,
"created_at" : "2022-09-05T23:48:44Z" ,
2023-05-15 14:39:03 +02:00
"updated_at" : "2023-05-15T09:10:12Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2022-09-06T14:07:31Z" ,
2023-05-15 14:39:03 +02:00
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
2023-05-13 02:28:47 +02:00
"forks_count" : 5 ,
2023-01-07 01:35:14 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-13 02:28:47 +02:00
"forks" : 5 ,
2023-05-15 14:39:03 +02:00
"watchers" : 15 ,
2023-01-07 01:35:14 +01:00
"score" : 0
2023-04-08 02:28:50 +02:00
} ,
{
"id" : 625005108 ,
"name" : "PsFix-CVE-2021-34527" ,
"full_name" : "fardinbarashi\/PsFix-CVE-2021-34527" ,
"owner" : {
"login" : "fardinbarashi" ,
"id" : 15907769 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15907769?v=4" ,
"html_url" : "https:\/\/github.com\/fardinbarashi"
} ,
"html_url" : "https:\/\/github.com\/fardinbarashi\/PsFix-CVE-2021-34527" ,
"description" : "# Fix-CVE-2021-34527 Fix for the security Script Changes ACL in the directory Stop Service PrintSpooler Spooler Changes StartupType to Disabled Add every server in the serverlist.csv and run script." ,
"fork" : false ,
"created_at" : "2023-04-07T20:14:31Z" ,
"updated_at" : "2023-04-07T20:18:26Z" ,
"pushed_at" : "2023-04-07T20:18:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2023-01-02 13:13:52 +01:00
}
]