2021-07-02 11:11:33 +02:00
[
{
"id" : 382021281 ,
"name" : "CVE-2021-34527" ,
"full_name" : "DenizSe\/CVE-2021-34527" ,
"owner" : {
"login" : "DenizSe" ,
"id" : 43039427 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4" ,
"html_url" : "https:\/\/github.com\/DenizSe"
} ,
"html_url" : "https:\/\/github.com\/DenizSe\/CVE-2021-34527" ,
"description" : "Small Powershell Script to detect Running Printer Spoolers on Domain Controller" ,
"fork" : false ,
"created_at" : "2021-07-01T12:12:16Z" ,
"updated_at" : "2021-07-02T07:49:06Z" ,
"pushed_at" : "2021-07-02T07:45:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-07-06 17:11:52 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-02 11:11:33 +02:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 382267064 ,
"name" : "PrintNightmare" ,
"full_name" : "glshnu\/PrintNightmare" ,
"owner" : {
"login" : "glshnu" ,
"id" : 7205231 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4" ,
"html_url" : "https:\/\/github.com\/glshnu"
} ,
"html_url" : "https:\/\/github.com\/glshnu\/PrintNightmare" ,
"description" : "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-02T07:30:52Z" ,
2021-07-11 23:12:15 +02:00
"updated_at" : "2021-07-11T21:18:01Z" ,
"pushed_at" : "2021-07-11T21:17:59Z" ,
2021-07-03 05:12:12 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-04 23:11:25 +02:00
"forks_count" : 4 ,
"forks" : 4 ,
2021-07-03 05:12:12 +02:00
"watchers" : 2 ,
2021-07-02 11:11:33 +02:00
"score" : 0
2021-07-02 17:11:48 +02:00
} ,
{
"id" : 382335385 ,
"name" : "CVE-2021-34527" ,
"full_name" : "JohnHammond\/CVE-2021-34527" ,
"owner" : {
"login" : "JohnHammond" ,
"id" : 6288722 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4" ,
"html_url" : "https:\/\/github.com\/JohnHammond"
} ,
"html_url" : "https:\/\/github.com\/JohnHammond\/CVE-2021-34527" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T12:10:49Z" ,
2021-07-12 11:11:54 +02:00
"updated_at" : "2021-07-12T07:56:21Z" ,
2021-07-02 17:11:48 +02:00
"pushed_at" : "2021-07-02T12:17:50Z" ,
2021-07-12 11:11:54 +02:00
"stargazers_count" : 100 ,
"watchers_count" : 100 ,
2021-07-09 23:13:09 +02:00
"forks_count" : 18 ,
"forks" : 18 ,
2021-07-12 11:11:54 +02:00
"watchers" : 100 ,
2021-07-02 17:11:48 +02:00
"score" : 0
} ,
{
"id" : 382370746 ,
"name" : "Fix-CVE-2021-34527" ,
"full_name" : "fardinbarashi\/Fix-CVE-2021-34527" ,
"owner" : {
"login" : "fardinbarashi" ,
"id" : 15907769 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15907769?v=4" ,
"html_url" : "https:\/\/github.com\/fardinbarashi"
} ,
"html_url" : "https:\/\/github.com\/fardinbarashi\/Fix-CVE-2021-34527" ,
"description" : "Fix for the security" ,
"fork" : false ,
"created_at" : "2021-07-02T14:25:44Z" ,
2021-07-03 11:11:22 +02:00
"updated_at" : "2021-07-03T09:03:00Z" ,
"pushed_at" : "2021-07-03T09:02:58Z" ,
2021-07-02 17:11:48 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-04 11:11:22 +02:00
} ,
{
"id" : 382645654 ,
"name" : "PrintNightmare-CVE-2021-34527" ,
"full_name" : "nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "nemo-wq" ,
"id" : 28733668 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4" ,
"html_url" : "https:\/\/github.com\/nemo-wq"
} ,
"html_url" : "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"description" : "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits" ,
"fork" : false ,
"created_at" : "2021-07-03T15:15:12Z" ,
2021-07-10 11:11:21 +02:00
"updated_at" : "2021-07-10T09:10:47Z" ,
2021-07-04 11:11:22 +02:00
"pushed_at" : "2021-07-04T06:26:48Z" ,
2021-07-10 11:11:21 +02:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2021-07-11 05:11:42 +02:00
"forks_count" : 4 ,
"forks" : 4 ,
2021-07-10 11:11:21 +02:00
"watchers" : 7 ,
2021-07-04 11:11:22 +02:00
"score" : 0
2021-07-04 23:11:25 +02:00
} ,
{
"id" : 382894525 ,
"name" : "CVE-2021-34527-1675" ,
"full_name" : "CnOxx1\/CVE-2021-34527-1675" ,
"owner" : {
"login" : "CnOxx1" ,
"id" : 86923954 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4" ,
"html_url" : "https:\/\/github.com\/CnOxx1"
} ,
"html_url" : "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675" ,
"description" : "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability! ! ! " ,
"fork" : false ,
"created_at" : "2021-07-04T16:09:18Z" ,
2021-07-05 05:11:34 +02:00
"updated_at" : "2021-07-05T01:15:21Z" ,
2021-07-04 23:11:25 +02:00
"pushed_at" : "2021-07-04T16:31:21Z" ,
2021-07-05 05:11:34 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-04 23:11:25 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-05 05:11:34 +02:00
"watchers" : 2 ,
2021-07-04 23:11:25 +02:00
"score" : 0
2021-07-05 23:11:36 +02:00
} ,
{
"id" : 383207766 ,
"name" : "disable-RegisterSpoolerRemoteRpcEndPoint" ,
"full_name" : "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint" ,
"owner" : {
"login" : "rdboboia" ,
"id" : 37208426 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4" ,
"html_url" : "https:\/\/github.com\/rdboboia"
} ,
"html_url" : "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint" ,
"description" : "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-05T16:49:32Z" ,
2021-07-08 23:11:37 +02:00
"updated_at" : "2021-07-08T21:11:43Z" ,
"pushed_at" : "2021-07-08T21:11:40Z" ,
2021-07-07 11:11:46 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-05 23:11:36 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-07 11:11:46 +02:00
"watchers" : 1 ,
2021-07-05 23:11:36 +02:00
"score" : 0
} ,
{
"id" : 383223006 ,
"name" : "CVE-2021-34527-PrintNightmare-Workaround" ,
"full_name" : "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround" ,
"owner" : {
"login" : "geekbrett" ,
"id" : 22183376 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4" ,
"html_url" : "https:\/\/github.com\/geekbrett"
} ,
"html_url" : "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround" ,
"description" : "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft." ,
"fork" : false ,
"created_at" : "2021-07-05T17:50:56Z" ,
2021-07-07 23:11:42 +02:00
"updated_at" : "2021-07-07T17:18:09Z" ,
"pushed_at" : "2021-07-07T17:18:07Z" ,
2021-07-05 23:11:36 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 383252170 ,
"name" : "CVE-2021-34527-workaround" ,
"full_name" : "officedrone\/CVE-2021-34527-workaround" ,
"owner" : {
"login" : "officedrone" ,
"id" : 67024372 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/67024372?v=4" ,
"html_url" : "https:\/\/github.com\/officedrone"
} ,
"html_url" : "https:\/\/github.com\/officedrone\/CVE-2021-34527-workaround" ,
"description" : "Disable remote sessions to print spooler withtout disabling the print spooler service " ,
"fork" : false ,
"created_at" : "2021-07-05T20:02:50Z" ,
2021-07-07 17:12:18 +02:00
"updated_at" : "2021-07-07T13:34:12Z" ,
"pushed_at" : "2021-07-07T13:34:09Z" ,
2021-07-05 23:11:36 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-06 23:11:35 +02:00
} ,
{
"id" : 383254488 ,
"name" : "ItWasAllADream" ,
"full_name" : "byt3bl33d3r\/ItWasAllADream" ,
"owner" : {
"login" : "byt3bl33d3r" ,
"id" : 5151193 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4" ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r"
} ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream" ,
"description" : "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE" ,
"fork" : false ,
"created_at" : "2021-07-05T20:13:49Z" ,
2021-07-12 11:11:54 +02:00
"updated_at" : "2021-07-12T09:10:10Z" ,
2021-07-09 23:13:09 +02:00
"pushed_at" : "2021-07-09T15:49:23Z" ,
2021-07-12 11:11:54 +02:00
"stargazers_count" : 526 ,
"watchers_count" : 526 ,
"forks_count" : 63 ,
"forks" : 63 ,
"watchers" : 526 ,
2021-07-07 11:11:46 +02:00
"score" : 0
} ,
{
"id" : 383699836 ,
"name" : "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"full_name" : "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "vinaysudheer" ,
"id" : 29897973 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4" ,
"html_url" : "https:\/\/github.com\/vinaysudheer"
} ,
"html_url" : "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"description" : "Simple batch script to disable the Microsoft Print Spooler service from system" ,
"fork" : false ,
"created_at" : "2021-07-07T06:41:15Z" ,
"updated_at" : "2021-07-07T06:47:16Z" ,
"pushed_at" : "2021-07-07T06:47:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 383719689 ,
"name" : "PrintNightmare-CVE-2021-34527" ,
"full_name" : "powershellpr0mpt\/PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "powershellpr0mpt" ,
"id" : 9294993 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9294993?v=4" ,
"html_url" : "https:\/\/github.com\/powershellpr0mpt"
} ,
"html_url" : "https:\/\/github.com\/powershellpr0mpt\/PrintNightmare-CVE-2021-34527" ,
"description" : "How to fix the PrintNightmare vulnerability" ,
"fork" : false ,
"created_at" : "2021-07-07T07:58:53Z" ,
2021-07-07 17:12:18 +02:00
"updated_at" : "2021-07-07T10:00:34Z" ,
"pushed_at" : "2021-07-07T10:00:32Z" ,
2021-07-07 11:11:46 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2021-07-06 23:11:35 +02:00
"score" : 0
2021-07-08 05:11:34 +02:00
} ,
{
"id" : 383968301 ,
"name" : "CVE-2021-34527_ACL_mitigation" ,
"full_name" : "WidespreadPandemic\/CVE-2021-34527_ACL_mitigation" ,
"owner" : {
"login" : "WidespreadPandemic" ,
"id" : 75406207 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75406207?v=4" ,
"html_url" : "https:\/\/github.com\/WidespreadPandemic"
} ,
"html_url" : "https:\/\/github.com\/WidespreadPandemic\/CVE-2021-34527_ACL_mitigation" ,
"description" : "Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs" ,
"fork" : false ,
"created_at" : "2021-07-08T01:32:18Z" ,
2021-07-09 11:11:54 +02:00
"updated_at" : "2021-07-09T03:54:14Z" ,
"pushed_at" : "2021-07-09T03:54:12Z" ,
2021-07-08 05:11:34 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-08 23:11:37 +02:00
} ,
{
"id" : 384221697 ,
"name" : "printnightmare" ,
"full_name" : "glorisonlai\/printnightmare" ,
"owner" : {
"login" : "glorisonlai" ,
"id" : 26339805 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26339805?v=4" ,
"html_url" : "https:\/\/github.com\/glorisonlai"
} ,
"html_url" : "https:\/\/github.com\/glorisonlai\/printnightmare" ,
"description" : "CVE-2021-34527 implementation" ,
"fork" : false ,
"created_at" : "2021-07-08T18:56:04Z" ,
"updated_at" : "2021-07-08T18:56:07Z" ,
"pushed_at" : "2021-07-08T18:56:05Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-09 11:11:54 +02:00
} ,
{
"id" : 384372251 ,
"name" : "CVE-2021-34527-Scanner-Based-On-cube0x0-POC" ,
"full_name" : "dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC" ,
"owner" : {
"login" : "dywhoami" ,
"id" : 87174410 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87174410?v=4" ,
"html_url" : "https:\/\/github.com\/dywhoami"
} ,
"html_url" : "https:\/\/github.com\/dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-09T08:27:36Z" ,
2021-07-11 05:11:42 +02:00
"updated_at" : "2021-07-11T00:23:22Z" ,
"pushed_at" : "2021-07-11T00:23:19Z" ,
2021-07-09 17:11:46 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 384385967 ,
"name" : "Printnightmare" ,
"full_name" : "Eutectico\/Printnightmare" ,
"owner" : {
"login" : "Eutectico" ,
"id" : 30925137 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/30925137?v=4" ,
"html_url" : "https:\/\/github.com\/Eutectico"
} ,
"html_url" : "https:\/\/github.com\/Eutectico\/Printnightmare" ,
"description" : "Fix for PrintNightmare CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-09T09:22:03Z" ,
"updated_at" : "2021-07-09T11:02:54Z" ,
"pushed_at" : "2021-07-09T11:02:51Z" ,
2021-07-09 11:11:54 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-10 05:11:34 +02:00
} ,
{
"id" : 384554464 ,
"name" : "PowerShell-PrintNightmare" ,
"full_name" : "syntaxbearror\/PowerShell-PrintNightmare" ,
"owner" : {
"login" : "syntaxbearror" ,
"id" : 53105897 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4" ,
"html_url" : "https:\/\/github.com\/syntaxbearror"
} ,
"html_url" : "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare" ,
"description" : "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-09T21:28:16Z" ,
2021-07-11 23:12:15 +02:00
"updated_at" : "2021-07-11T16:21:00Z" ,
2021-07-10 05:11:34 +02:00
"pushed_at" : "2021-07-09T21:46:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-10 11:11:21 +02:00
} ,
{
"id" : 384648043 ,
"name" : "PrintNightmare_Resolver" ,
"full_name" : "0xIrison\/PrintNightmare_Resolver" ,
"owner" : {
"login" : "0xIrison" ,
"id" : 87223944 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87223944?v=4" ,
"html_url" : "https:\/\/github.com\/0xIrison"
} ,
"html_url" : "https:\/\/github.com\/0xIrison\/PrintNightmare_Resolver" ,
"description" : "A fix for PrintNightmare vulnerability that occurs to print spoolers for Windows machines [CVE-2021-34527]" ,
"fork" : false ,
"created_at" : "2021-07-10T08:21:28Z" ,
"updated_at" : "2021-07-10T08:24:35Z" ,
"pushed_at" : "2021-07-10T08:24:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-02 11:11:33 +02:00
}
]