2023-01-02 13:13:52 +01:00
[
2023-06-19 10:13:15 +02:00
{
"id" : 382021281 ,
"name" : "CVE-2021-34527" ,
"full_name" : "DenizSe\/CVE-2021-34527" ,
"owner" : {
"login" : "DenizSe" ,
"id" : 43039427 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4" ,
"html_url" : "https:\/\/github.com\/DenizSe"
} ,
"html_url" : "https:\/\/github.com\/DenizSe\/CVE-2021-34527" ,
"description" : "Small Powershell Script to detect Running Printer Spoolers on Domain Controller" ,
"fork" : false ,
"created_at" : "2021-07-01T12:12:16Z" ,
"updated_at" : "2021-07-02T07:49:06Z" ,
"pushed_at" : "2021-07-02T07:45:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-1675" ,
"cve-2021-34527" ,
"domaincontroller" ,
"printnightmare" ,
"printspooler"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 382267064 ,
"name" : "PrintNightmare" ,
"full_name" : "glshnu\/PrintNightmare" ,
"owner" : {
"login" : "glshnu" ,
"id" : 7205231 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4" ,
"html_url" : "https:\/\/github.com\/glshnu"
} ,
"html_url" : "https:\/\/github.com\/glshnu\/PrintNightmare" ,
"description" : "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-02T07:30:52Z" ,
"updated_at" : "2022-11-24T11:13:27Z" ,
"pushed_at" : "2021-07-12T15:07:05Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 3 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 382335385 ,
"name" : "CVE-2021-34527" ,
"full_name" : "JohnHammond\/CVE-2021-34527" ,
"owner" : {
"login" : "JohnHammond" ,
"id" : 6288722 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4" ,
"html_url" : "https:\/\/github.com\/JohnHammond"
} ,
"html_url" : "https:\/\/github.com\/JohnHammond\/CVE-2021-34527" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T12:10:49Z" ,
2023-08-04 08:32:51 +02:00
"updated_at" : "2023-08-04T05:22:11Z" ,
2023-06-19 10:13:15 +02:00
"pushed_at" : "2021-07-02T12:17:50Z" ,
2023-08-04 08:32:51 +02:00
"stargazers_count" : 213 ,
"watchers_count" : 213 ,
2023-06-19 10:13:15 +02:00
"has_discussions" : false ,
2023-07-05 20:25:21 +02:00
"forks_count" : 59 ,
2023-06-19 10:13:15 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-07-05 20:25:21 +02:00
"forks" : 59 ,
2023-08-04 08:32:51 +02:00
"watchers" : 213 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-07-11 02:26:47 +02:00
"subscribers_count" : 8
2023-06-19 10:13:15 +02:00
} ,
2023-01-02 13:13:52 +01:00
{
"id" : 382645654 ,
"name" : "PrintNightmare-CVE-2021-34527" ,
"full_name" : "nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "nemo-wq" ,
"id" : 28733668 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4" ,
"html_url" : "https:\/\/github.com\/nemo-wq"
} ,
"html_url" : "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"description" : "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits" ,
"fork" : false ,
"created_at" : "2021-07-03T15:15:12Z" ,
2023-08-04 08:32:51 +02:00
"updated_at" : "2023-08-04T05:22:12Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2021-09-13T12:12:17Z" ,
2023-08-04 08:32:51 +02:00
"stargazers_count" : 91 ,
"watchers_count" : 91 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-07-28 15:45:05 +02:00
"forks_count" : 35 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-1675" ,
"cve-2021-34527" ,
"howto-tutorial" ,
"printnightmare" ,
"rce" ,
"windowsexploits"
] ,
"visibility" : "public" ,
2023-07-28 15:45:05 +02:00
"forks" : 35 ,
2023-08-04 08:32:51 +02:00
"watchers" : 91 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-07-11 02:26:47 +02:00
"subscribers_count" : 7
2023-01-02 13:13:52 +01:00
} ,
2023-06-19 10:13:15 +02:00
{
"id" : 382894525 ,
"name" : "CVE-2021-34527-1675" ,
"full_name" : "CnOxx1\/CVE-2021-34527-1675" ,
"owner" : {
"login" : "CnOxx1" ,
"id" : 86923954 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4" ,
"html_url" : "https:\/\/github.com\/CnOxx1"
} ,
"html_url" : "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675" ,
"description" : "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability! ! ! " ,
"fork" : false ,
"created_at" : "2021-07-04T16:09:18Z" ,
"updated_at" : "2021-09-06T06:08:09Z" ,
"pushed_at" : "2021-07-04T16:31:21Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : true ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 6 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 383207766 ,
"name" : "disable-RegisterSpoolerRemoteRpcEndPoint" ,
"full_name" : "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint" ,
"owner" : {
"login" : "rdboboia" ,
"id" : 37208426 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4" ,
"html_url" : "https:\/\/github.com\/rdboboia"
} ,
"html_url" : "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint" ,
"description" : "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-05T16:49:32Z" ,
"updated_at" : "2021-07-08T21:11:43Z" ,
"pushed_at" : "2021-07-08T21:11:40Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 383223006 ,
"name" : "CVE-2021-34527-PrintNightmare-Workaround" ,
"full_name" : "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround" ,
"owner" : {
"login" : "geekbrett" ,
"id" : 22183376 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4" ,
"html_url" : "https:\/\/github.com\/geekbrett"
} ,
"html_url" : "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround" ,
"description" : "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft." ,
"fork" : false ,
"created_at" : "2021-07-05T17:50:56Z" ,
"updated_at" : "2022-03-18T12:17:32Z" ,
"pushed_at" : "2021-07-07T17:18:07Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-06-19 10:13:15 +02:00
} ,
2023-01-02 13:13:52 +01:00
{
"id" : 383254488 ,
"name" : "ItWasAllADream" ,
"full_name" : "byt3bl33d3r\/ItWasAllADream" ,
"owner" : {
"login" : "byt3bl33d3r" ,
"id" : 5151193 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4" ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r"
} ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream" ,
"description" : "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE" ,
"fork" : false ,
"created_at" : "2021-07-05T20:13:49Z" ,
2023-07-27 08:32:37 +02:00
"updated_at" : "2023-07-27T00:29:06Z" ,
2023-01-18 19:35:10 +01:00
"pushed_at" : "2023-01-18T13:58:42Z" ,
2023-07-27 08:32:37 +02:00
"stargazers_count" : 725 ,
"watchers_count" : 725 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-07-27 08:32:37 +02:00
"forks_count" : 116 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-07-27 08:32:37 +02:00
"forks" : 116 ,
"watchers" : 725 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 10
2023-01-02 13:13:52 +01:00
} ,
2023-06-19 10:13:15 +02:00
{
"id" : 383699836 ,
"name" : "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"full_name" : "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "vinaysudheer" ,
"id" : 29897973 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4" ,
"html_url" : "https:\/\/github.com\/vinaysudheer"
} ,
"html_url" : "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"description" : "Simple batch script to disable the Microsoft Print Spooler service from system" ,
"fork" : false ,
"created_at" : "2021-07-07T06:41:15Z" ,
"updated_at" : "2021-07-07T06:47:16Z" ,
"pushed_at" : "2021-07-07T06:47:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 383719689 ,
"name" : "PrintNightmare-CVE-2021-34527" ,
"full_name" : "powershellpr0mpt\/PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "powershellpr0mpt" ,
"id" : 9294993 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9294993?v=4" ,
"html_url" : "https:\/\/github.com\/powershellpr0mpt"
} ,
"html_url" : "https:\/\/github.com\/powershellpr0mpt\/PrintNightmare-CVE-2021-34527" ,
"description" : "How to fix the PrintNightmare vulnerability" ,
"fork" : false ,
"created_at" : "2021-07-07T07:58:53Z" ,
2023-07-30 15:46:41 +02:00
"updated_at" : "2023-07-30T11:49:05Z" ,
2023-06-19 10:13:15 +02:00
"pushed_at" : "2021-07-07T10:00:32Z" ,
2023-07-30 15:46:41 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-06-19 10:13:15 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-07-30 15:46:41 +02:00
"watchers" : 2 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 383968301 ,
"name" : "CVE-2021-34527_ACL_mitigation" ,
"full_name" : "WidespreadPandemic\/CVE-2021-34527_ACL_mitigation" ,
"owner" : {
"login" : "WidespreadPandemic" ,
"id" : 75406207 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75406207?v=4" ,
"html_url" : "https:\/\/github.com\/WidespreadPandemic"
} ,
"html_url" : "https:\/\/github.com\/WidespreadPandemic\/CVE-2021-34527_ACL_mitigation" ,
"description" : "Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs" ,
"fork" : false ,
"created_at" : "2021-07-08T01:32:18Z" ,
"updated_at" : "2021-07-09T03:54:14Z" ,
"pushed_at" : "2021-07-09T03:54:12Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 384221697 ,
"name" : "printnightmare" ,
"full_name" : "glorisonlai\/printnightmare" ,
"owner" : {
"login" : "glorisonlai" ,
"id" : 26339805 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26339805?v=4" ,
"html_url" : "https:\/\/github.com\/glorisonlai"
} ,
"html_url" : "https:\/\/github.com\/glorisonlai\/printnightmare" ,
"description" : "CVE-2021-34527 implementation" ,
"fork" : false ,
"created_at" : "2021-07-08T18:56:04Z" ,
"updated_at" : "2021-07-08T18:56:07Z" ,
"pushed_at" : "2021-07-08T18:56:05Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 384372251 ,
"name" : "CVE-2021-34527-Scanner-Based-On-cube0x0-POC" ,
"full_name" : "dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC" ,
"owner" : {
"login" : "dywhoami" ,
"id" : 87174410 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87174410?v=4" ,
"html_url" : "https:\/\/github.com\/dywhoami"
} ,
"html_url" : "https:\/\/github.com\/dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-09T08:27:36Z" ,
"updated_at" : "2022-06-25T14:18:01Z" ,
"pushed_at" : "2021-07-11T00:23:19Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 384385967 ,
"name" : "Printnightmare" ,
"full_name" : "Eutectico\/Printnightmare" ,
"owner" : {
"login" : "Eutectico" ,
"id" : 30925137 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/30925137?v=4" ,
"html_url" : "https:\/\/github.com\/Eutectico"
} ,
"html_url" : "https:\/\/github.com\/Eutectico\/Printnightmare" ,
"description" : "Fix for PrintNightmare CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-09T09:22:03Z" ,
"updated_at" : "2021-07-09T11:02:54Z" ,
"pushed_at" : "2021-07-09T11:02:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 384554464 ,
"name" : "PowerShell-PrintNightmare" ,
"full_name" : "syntaxbearror\/PowerShell-PrintNightmare" ,
"owner" : {
"login" : "syntaxbearror" ,
"id" : 53105897 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4" ,
"html_url" : "https:\/\/github.com\/syntaxbearror"
} ,
"html_url" : "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare" ,
"description" : "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-09T21:28:16Z" ,
"updated_at" : "2021-07-11T16:21:00Z" ,
"pushed_at" : "2021-07-09T21:46:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
{
"id" : 385271497 ,
"name" : "PrintNightmare-Patcher" ,
"full_name" : "0xirison\/PrintNightmare-Patcher" ,
"owner" : {
"login" : "0xirison" ,
"id" : 87223944 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87223944?v=4" ,
"html_url" : "https:\/\/github.com\/0xirison"
} ,
"html_url" : "https:\/\/github.com\/0xirison\/PrintNightmare-Patcher" ,
"description" : "A patch for PrintNightmare vulnerability that occurs to print spooler service for Windows machines [CVE-2021-34527]" ,
"fork" : false ,
"created_at" : "2021-07-12T14:14:29Z" ,
"updated_at" : "2022-03-18T12:17:08Z" ,
"pushed_at" : "2021-07-23T05:03:06Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-34527" ,
"printnightmare" ,
"python3" ,
"security" ,
"security-tools" ,
"vulnerability" ,
"windows"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-19 10:13:15 +02:00
} ,
2023-01-02 13:13:52 +01:00
{
2023-05-25 08:30:32 +02:00
"id" : 390263988 ,
"name" : "PrintNightmare" ,
"full_name" : "Tomparte\/PrintNightmare" ,
2023-01-02 13:13:52 +01:00
"owner" : {
2023-05-25 08:30:32 +02:00
"login" : "Tomparte" ,
"id" : 88080067 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88080067?v=4" ,
"html_url" : "https:\/\/github.com\/Tomparte"
2023-01-02 13:13:52 +01:00
} ,
2023-05-25 08:30:32 +02:00
"html_url" : "https:\/\/github.com\/Tomparte\/PrintNightmare" ,
"description" : "To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)" ,
2023-01-02 13:13:52 +01:00
"fork" : false ,
2023-05-25 08:30:32 +02:00
"created_at" : "2021-07-28T07:55:42Z" ,
2023-08-01 16:07:11 +02:00
"updated_at" : "2023-08-01T13:42:52Z" ,
2023-05-25 08:30:32 +02:00
"pushed_at" : "2021-08-20T11:41:18Z" ,
2023-01-02 13:13:52 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
2023-05-25 08:30:32 +02:00
"forks_count" : 0 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2023-05-25 08:30:32 +02:00
"topics" : [
"batch-script" ,
"cve-2021-1675" ,
"cve-2021-34527" ,
"cve-2021-36958" ,
"cve-2021-40447" ,
"cybersecurity" ,
"powershell-script" ,
"print" ,
"printnightmare" ,
"security" ,
"spooler" ,
"to-do" ,
"windows"
] ,
2023-01-02 13:13:52 +01:00
"visibility" : "public" ,
2023-05-25 08:30:32 +02:00
"forks" : 0 ,
2023-01-02 13:13:52 +01:00
"watchers" : 3 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 437822133 ,
"name" : "CVE-2021-34527" ,
"full_name" : "Amaranese\/CVE-2021-34527" ,
"owner" : {
"login" : "Amaranese" ,
"id" : 32201849 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4" ,
"html_url" : "https:\/\/github.com\/Amaranese"
} ,
"html_url" : "https:\/\/github.com\/Amaranese\/CVE-2021-34527" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-13T10:04:49Z" ,
"updated_at" : "2021-12-13T10:21:38Z" ,
"pushed_at" : "2021-12-13T10:21:35Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 507019653 ,
"name" : "CVE-2021-34527" ,
"full_name" : "cyb3rpeace\/CVE-2021-34527" ,
"owner" : {
"login" : "cyb3rpeace" ,
"id" : 108078112 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/108078112?v=4" ,
"html_url" : "https:\/\/github.com\/cyb3rpeace"
} ,
"html_url" : "https:\/\/github.com\/cyb3rpeace\/CVE-2021-34527" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-06-24T13:25:25Z" ,
"updated_at" : "2022-06-24T13:25:39Z" ,
"pushed_at" : "2022-06-24T13:25:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 528150029 ,
"name" : "CVE-2021-34527" ,
"full_name" : "m8sec\/CVE-2021-34527" ,
"owner" : {
"login" : "m8sec" ,
"id" : 13889819 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/13889819?v=4" ,
"html_url" : "https:\/\/github.com\/m8sec"
} ,
"html_url" : "https:\/\/github.com\/m8sec\/CVE-2021-34527" ,
"description" : "PrintNightmare (CVE-2021-34527) PoC Exploit" ,
"fork" : false ,
"created_at" : "2022-08-23T20:20:45Z" ,
2023-08-04 08:32:51 +02:00
"updated_at" : "2023-08-04T05:23:36Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2022-12-17T16:10:46Z" ,
2023-08-04 08:32:51 +02:00
"stargazers_count" : 76 ,
"watchers_count" : 76 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
2023-07-02 08:26:03 +02:00
"forks_count" : 17 ,
2023-01-07 01:35:14 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-07-02 08:26:03 +02:00
"forks" : 17 ,
2023-08-04 08:32:51 +02:00
"watchers" : 76 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-07-11 02:26:47 +02:00
"subscribers_count" : 2
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 533095208 ,
"name" : "cve-2021-34527" ,
"full_name" : "hackerhouse-opensource\/cve-2021-34527" ,
"owner" : {
"login" : "hackerhouse-opensource" ,
"id" : 43967630 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4" ,
"html_url" : "https:\/\/github.com\/hackerhouse-opensource"
} ,
"html_url" : "https:\/\/github.com\/hackerhouse-opensource\/cve-2021-34527" ,
"description" : "CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation" ,
"fork" : false ,
"created_at" : "2022-09-05T23:48:44Z" ,
2023-07-26 20:37:47 +02:00
"updated_at" : "2023-07-26T14:52:07Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2022-09-06T14:07:31Z" ,
2023-07-26 20:37:47 +02:00
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
2023-05-13 02:28:47 +02:00
"forks_count" : 5 ,
2023-01-07 01:35:14 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-13 02:28:47 +02:00
"forks" : 5 ,
2023-07-26 20:37:47 +02:00
"watchers" : 17 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 3
2023-04-08 02:28:50 +02:00
} ,
{
"id" : 625005108 ,
"name" : "PsFix-CVE-2021-34527" ,
"full_name" : "fardinbarashi\/PsFix-CVE-2021-34527" ,
"owner" : {
"login" : "fardinbarashi" ,
"id" : 15907769 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15907769?v=4" ,
"html_url" : "https:\/\/github.com\/fardinbarashi"
} ,
"html_url" : "https:\/\/github.com\/fardinbarashi\/PsFix-CVE-2021-34527" ,
"description" : "# Fix-CVE-2021-34527 Fix for the security Script Changes ACL in the directory Stop Service PrintSpooler Spooler Changes StartupType to Disabled Add every server in the serverlist.csv and run script." ,
"fork" : false ,
"created_at" : "2023-04-07T20:14:31Z" ,
"updated_at" : "2023-04-07T20:18:26Z" ,
"pushed_at" : "2023-04-07T20:18:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-02 13:13:52 +01:00
}
]