[ { "id": 381392691, "name": "CVE-2021-1675", "full_name": "yu2u\/CVE-2021-1675", "owner": { "login": "yu2u", "id": 25322880, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4", "html_url": "https:\/\/github.com\/yu2u" }, "html_url": "https:\/\/github.com\/yu2u\/CVE-2021-1675", "description": "CVE-2021-1675 exploit", "fork": false, "created_at": "2021-06-29T14:24:30Z", "updated_at": "2021-09-15T02:02:40Z", "pushed_at": "2021-06-29T14:26:25Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 381444656, "name": "CVE-2021-1675", "full_name": "cube0x0\/CVE-2021-1675", "owner": { "login": "cube0x0", "id": 39370848, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4", "html_url": "https:\/\/github.com\/cube0x0" }, "html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675", "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", "updated_at": "2021-10-15T01:57:02Z", "pushed_at": "2021-07-20T15:28:13Z", "stargazers_count": 1417, "watchers_count": 1417, "forks_count": 523, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 523, "watchers": 1417, "score": 0 }, { "id": 381799016, "name": "CVE-2021-1675", "full_name": "LaresLLC\/CVE-2021-1675", "owner": { "login": "LaresLLC", "id": 63059624, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4", "html_url": "https:\/\/github.com\/LaresLLC" }, "html_url": "https:\/\/github.com\/LaresLLC\/CVE-2021-1675", "description": "CVE-2021-1675 Detection Info", "fork": false, "created_at": "2021-06-30T18:32:17Z", "updated_at": "2021-10-06T17:39:34Z", "pushed_at": "2021-07-07T15:43:05Z", "stargazers_count": 210, "watchers_count": 210, "forks_count": 34, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 34, "watchers": 210, "score": 0 }, { "id": 381858715, "name": "patch-cve-2021-1675", "full_name": "kondah\/patch-cve-2021-1675", "owner": { "login": "kondah", "id": 7760108, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4", "html_url": "https:\/\/github.com\/kondah" }, "html_url": "https:\/\/github.com\/kondah\/patch-cve-2021-1675", "description": null, "fork": false, "created_at": "2021-06-30T23:39:21Z", "updated_at": "2021-07-01T19:35:37Z", "pushed_at": "2021-06-30T23:40:44Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 381971547, "name": "CVE-2021-1675-LPE-EXP", "full_name": "evilashz\/CVE-2021-1675-LPE-EXP", "owner": { "login": "evilashz", "id": 50722929, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4", "html_url": "https:\/\/github.com\/evilashz" }, "html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP", "description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527", "fork": false, "created_at": "2021-07-01T09:00:31Z", "updated_at": "2021-09-30T18:35:27Z", "pushed_at": "2021-07-02T10:47:36Z", "stargazers_count": 29, "watchers_count": 29, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-1675", "cve-2021-34527", "hacktool", "lpe", "printnightmare", "redteam", "redteam-tools", "windows" ], "visibility": "public", "forks": 17, "watchers": 29, "score": 0 }, { "id": 381984439, "name": "CVE-2021-1675-LPE", "full_name": "hlldz\/CVE-2021-1675-LPE", "owner": { "login": "hlldz", "id": 16455559, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4", "html_url": "https:\/\/github.com\/hlldz" }, "html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE", "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-07-01T09:47:13Z", "updated_at": "2021-10-13T07:15:14Z", "pushed_at": "2021-07-05T06:46:12Z", "stargazers_count": 301, "watchers_count": 301, "forks_count": 73, "allow_forking": true, "is_template": false, "topics": [ "cobaltstrike", "cve-2021-1675", "cve-2021-34527", "exploit", "lpe", "printnightmare", "reflectivedll", "windows" ], "visibility": "public", "forks": 73, "watchers": 301, "score": 0 }, { "id": 382024474, "name": "CVE-2021-1675", "full_name": "puckiestyle\/CVE-2021-1675", "owner": { "login": "puckiestyle", "id": 57447087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", "html_url": "https:\/\/github.com\/puckiestyle" }, "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-01T12:24:19Z", "updated_at": "2021-10-03T13:04:21Z", "pushed_at": "2021-10-03T13:04:19Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 1, "score": 0 }, { "id": 382050919, "name": "CVE-2021-1675_PrintNightMare", "full_name": "cybersecurityworks553\/CVE-2021-1675_PrintNightMare", "owner": { "login": "cybersecurityworks553", "id": 63910792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4", "html_url": "https:\/\/github.com\/cybersecurityworks553" }, "html_url": "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare", "description": null, "fork": false, "created_at": "2021-07-01T13:58:01Z", "updated_at": "2021-10-11T20:43:35Z", "pushed_at": "2021-07-01T14:26:05Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 14, "score": 0 }, { "id": 382141130, "name": "CVE-2021-1675", "full_name": "tanarchytan\/CVE-2021-1675", "owner": { "login": "tanarchytan", "id": 2339027, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4", "html_url": "https:\/\/github.com\/tanarchytan" }, "html_url": "https:\/\/github.com\/tanarchytan\/CVE-2021-1675", "description": "Fix without disabling Print Spooler", "fork": false, "created_at": "2021-07-01T19:50:46Z", "updated_at": "2021-08-05T03:00:30Z", "pushed_at": "2021-07-02T04:32:18Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 382182179, "name": "CVE-2021-1675", "full_name": "calebstewart\/CVE-2021-1675", "owner": { "login": "calebstewart", "id": 7529189, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4", "html_url": "https:\/\/github.com\/calebstewart" }, "html_url": "https:\/\/github.com\/calebstewart\/CVE-2021-1675", "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", "updated_at": "2021-10-14T11:24:07Z", "pushed_at": "2021-07-05T08:54:06Z", "stargazers_count": 660, "watchers_count": 660, "forks_count": 174, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 174, "watchers": 660, "score": 0 }, { "id": 382200984, "name": "CVE-2021-1675-SCANNER", "full_name": "Leonidus0x10\/CVE-2021-1675-SCANNER", "owner": { "login": "Leonidus0x10", "id": 72128281, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4", "html_url": "https:\/\/github.com\/Leonidus0x10" }, "html_url": "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER", "description": "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare", "fork": false, "created_at": "2021-07-02T01:45:00Z", "updated_at": "2021-10-11T20:43:16Z", "pushed_at": "2021-07-02T01:52:46Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-1675", "exploit", "hacktheplanet", "python", "scanner" ], "visibility": "public", "forks": 2, "watchers": 8, "score": 0 }, { "id": 382249207, "name": "CVE-2021-1675", "full_name": "thomasgeens\/CVE-2021-1675", "owner": { "login": "thomasgeens", "id": 2236721, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4", "html_url": "https:\/\/github.com\/thomasgeens" }, "html_url": "https:\/\/github.com\/thomasgeens\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-02T06:14:29Z", "updated_at": "2021-07-02T12:17:58Z", "pushed_at": "2021-07-02T06:14:39Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 382266932, "name": "CVE-2021-1675_CarbonBlack_HuntingQuery", "full_name": "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery", "owner": { "login": "mrezqi", "id": 2455832, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4", "html_url": "https:\/\/github.com\/mrezqi" }, "html_url": "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery", "description": null, "fork": false, "created_at": "2021-07-02T07:30:24Z", "updated_at": "2021-07-02T08:01:10Z", "pushed_at": "2021-07-02T08:01:07Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 382399375, "name": "CVE-2021-1675-PrintNightmare", "full_name": "killtr0\/CVE-2021-1675-PrintNightmare", "owner": { "login": "killtr0", "id": 22793707, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4", "html_url": "https:\/\/github.com\/killtr0" }, "html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare", "description": null, "fork": false, "created_at": "2021-07-02T16:12:15Z", "updated_at": "2021-07-06T12:54:30Z", "pushed_at": "2021-07-02T16:12:59Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 382407157, "name": "CVE-2021-1675", "full_name": "corelight\/CVE-2021-1675", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-02T16:44:24Z", "updated_at": "2021-08-06T21:45:23Z", "pushed_at": "2021-07-09T14:17:40Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0 }, { "id": 382418030, "name": "CVE-2021-1675", "full_name": "kougyokugentou\/CVE-2021-1675", "owner": { "login": "kougyokugentou", "id": 41278462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4", "html_url": "https:\/\/github.com\/kougyokugentou" }, "html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675", "description": "A small powershell script to disable print spooler service using desired state configuration", "fork": false, "created_at": "2021-07-02T17:29:04Z", "updated_at": "2021-07-02T17:41:53Z", "pushed_at": "2021-07-02T17:40:09Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 382425733, "name": "CVE-2021-1675", "full_name": "ptter23\/CVE-2021-1675", "owner": { "login": "ptter23", "id": 55167410, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4", "html_url": "https:\/\/github.com\/ptter23" }, "html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675", "description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS", "fork": false, "created_at": "2021-07-02T18:01:21Z", "updated_at": "2021-07-02T18:07:48Z", "pushed_at": "2021-07-02T18:07:45Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 382466613, "name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler", "full_name": "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler", "owner": { "login": "gohrenberg", "id": 80491750, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4", "html_url": "https:\/\/github.com\/gohrenberg" }, "html_url": "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler", "description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ", "fork": false, "created_at": "2021-07-02T21:18:11Z", "updated_at": "2021-07-03T17:29:23Z", "pushed_at": "2021-07-05T05:41:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-1675", "printnightmare" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 382496518, "name": "cve-2021-1675-printnightmare", "full_name": "initconf\/cve-2021-1675-printnightmare", "owner": { "login": "initconf", "id": 4044729, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4", "html_url": "https:\/\/github.com\/initconf" }, "html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare", "description": "to catch cve-2021-1675-printnightmare", "fork": false, "created_at": "2021-07-03T01:04:06Z", "updated_at": "2021-07-03T01:08:45Z", "pushed_at": "2021-07-03T01:08:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 382609559, "name": "PrintNightmare", "full_name": "ozergoker\/PrintNightmare", "owner": { "login": "ozergoker", "id": 86879266, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4", "html_url": "https:\/\/github.com\/ozergoker" }, "html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare", "description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)", "fork": false, "created_at": "2021-07-03T12:25:21Z", "updated_at": "2021-09-13T04:44:04Z", "pushed_at": "2021-07-03T12:43:26Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 382815972, "name": "PrintNightmare-CVE-2021-1675", "full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675", "owner": { "login": "exploitblizzard", "id": 61627070, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4", "html_url": "https:\/\/github.com\/exploitblizzard" }, "html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675", "description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ", "fork": false, "created_at": "2021-07-04T09:50:39Z", "updated_at": "2021-09-17T08:02:28Z", "pushed_at": "2021-07-04T09:57:46Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0 }, { "id": 383128850, "name": "CVE-2021-1675", "full_name": "edsonjt81\/CVE-2021-1675", "owner": { "login": "edsonjt81", "id": 27496739, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4", "html_url": "https:\/\/github.com\/edsonjt81" }, "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-05T12:10:43Z", "updated_at": "2021-07-05T12:10:59Z", "pushed_at": "2021-07-05T12:10:55Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 383165321, "name": "PrintNightmare-LPE", "full_name": "sailay1996\/PrintNightmare-LPE", "owner": { "login": "sailay1996", "id": 16739401, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4", "html_url": "https:\/\/github.com\/sailay1996" }, "html_url": "https:\/\/github.com\/sailay1996\/PrintNightmare-LPE", "description": "CVE-2021-1675 (PrintNightmare)", "fork": false, "created_at": "2021-07-05T14:17:03Z", "updated_at": "2021-10-13T08:29:42Z", "pushed_at": "2021-07-05T14:34:34Z", "stargazers_count": 58, "watchers_count": 58, "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [ "local-privilege-escalation", "printnightmare", "windows-exploitation", "windows-privilege-escalation" ], "visibility": "public", "forks": 22, "watchers": 58, "score": 0 }, { "id": 383728669, "name": "PrintNightmare", "full_name": "JumpsecLabs\/PrintNightmare", "owner": { "login": "JumpsecLabs", "id": 49488209, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4", "html_url": "https:\/\/github.com\/JumpsecLabs" }, "html_url": "https:\/\/github.com\/JumpsecLabs\/PrintNightmare", "description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527", "fork": false, "created_at": "2021-07-07T08:32:09Z", "updated_at": "2021-08-23T04:38:37Z", "pushed_at": "2021-07-12T09:28:16Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 16, "score": 0 }, { "id": 384183711, "name": "CVE-2021-1675-Yara", "full_name": "bartimus-primed\/CVE-2021-1675-Yara", "owner": { "login": "bartimus-primed", "id": 465079, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/465079?v=4", "html_url": "https:\/\/github.com\/bartimus-primed" }, "html_url": "https:\/\/github.com\/bartimus-primed\/CVE-2021-1675-Yara", "description": null, "fork": false, "created_at": "2021-07-08T16:18:52Z", "updated_at": "2021-07-19T18:33:55Z", "pushed_at": "2021-07-08T16:19:45Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 384854320, "name": "cve-2021-1675", "full_name": "k8gege\/cve-2021-1675", "owner": { "login": "k8gege", "id": 42312878, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4", "html_url": "https:\/\/github.com\/k8gege" }, "html_url": "https:\/\/github.com\/k8gege\/cve-2021-1675", "description": null, "fork": false, "created_at": "2021-07-11T03:48:25Z", "updated_at": "2021-10-14T07:08:15Z", "pushed_at": "2021-07-11T03:49:44Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 14, "score": 0 }, { "id": 385174791, "name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527", "full_name": "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527", "owner": { "login": "galoget", "id": 8353133, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4", "html_url": "https:\/\/github.com\/galoget" }, "html_url": "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527", "description": "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)", "fork": false, "created_at": "2021-07-12T08:18:40Z", "updated_at": "2021-07-12T08:51:24Z", "pushed_at": "2021-07-12T08:35:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 386724774, "name": "Microsoft-CVE-2021-1675", "full_name": "thalpius\/Microsoft-CVE-2021-1675", "owner": { "login": "thalpius", "id": 49958238, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49958238?v=4", "html_url": "https:\/\/github.com\/thalpius" }, "html_url": "https:\/\/github.com\/thalpius\/Microsoft-CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-16T18:06:05Z", "updated_at": "2021-07-18T14:03:08Z", "pushed_at": "2021-07-18T14:03:05Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 387694592, "name": "CVE-2021-1675", "full_name": "Winter3un\/CVE-2021-1675", "owner": { "login": "Winter3un", "id": 12570968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12570968?v=4", "html_url": "https:\/\/github.com\/Winter3un" }, "html_url": "https:\/\/github.com\/Winter3un\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-20T06:26:45Z", "updated_at": "2021-07-20T06:54:56Z", "pushed_at": "2021-07-20T06:46:12Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 388427598, "name": "my-CVE-2021-1675", "full_name": "hahaleyile\/my-CVE-2021-1675", "owner": { "login": "hahaleyile", "id": 38727644, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4", "html_url": "https:\/\/github.com\/hahaleyile" }, "html_url": "https:\/\/github.com\/hahaleyile\/my-CVE-2021-1675", "description": "see https:\/\/github.com\/cube0x0\/CVE-2021-1675", "fork": false, "created_at": "2021-07-22T10:49:30Z", "updated_at": "2021-08-30T13:06:01Z", "pushed_at": "2021-08-13T15:15:05Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 402035048, "name": "CVE-2021-1675_RDL_LPE", "full_name": "mstxq17\/CVE-2021-1675_RDL_LPE", "owner": { "login": "mstxq17", "id": 29624427, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4", "html_url": "https:\/\/github.com\/mstxq17" }, "html_url": "https:\/\/github.com\/mstxq17\/CVE-2021-1675_RDL_LPE", "description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。", "fork": false, "created_at": "2021-09-01T11:25:04Z", "updated_at": "2021-10-15T02:58:27Z", "pushed_at": "2021-09-01T11:25:22Z", "stargazers_count": 101, "watchers_count": 101, "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 101, "score": 0 }, { "id": 410565318, "name": "PrintNightmare", "full_name": "ollypwn\/PrintNightmare", "owner": { "login": "ollypwn", "id": 53348818, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4", "html_url": "https:\/\/github.com\/ollypwn" }, "html_url": "https:\/\/github.com\/ollypwn\/PrintNightmare", "description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)", "fork": false, "created_at": "2021-09-26T13:53:10Z", "updated_at": "2021-10-14T23:42:10Z", "pushed_at": "2021-09-26T13:58:18Z", "stargazers_count": 51, "watchers_count": 51, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-1675", "cve-2021-34527" ], "visibility": "public", "forks": 12, "watchers": 51, "score": 0 }, { "id": 410658843, "name": "SharpPN", "full_name": "Wra7h\/SharpPN", "owner": { "login": "Wra7h", "id": 60988551, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60988551?v=4", "html_url": "https:\/\/github.com\/Wra7h" }, "html_url": "https:\/\/github.com\/Wra7h\/SharpPN", "description": "C# PrintNightmare (CVE-2021-1675)", "fork": false, "created_at": "2021-09-26T20:46:23Z", "updated_at": "2021-09-26T22:35:58Z", "pushed_at": "2021-09-26T22:35:07Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 413951914, "name": "CVE-2021-1675-PrintNightmare", "full_name": "OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare", "owner": { "login": "OppressionBreedsResistance", "id": 60150959, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60150959?v=4", "html_url": "https:\/\/github.com\/OppressionBreedsResistance" }, "html_url": "https:\/\/github.com\/OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare", "description": "Working PowerShell POC", "fork": false, "created_at": "2021-10-05T19:24:23Z", "updated_at": "2021-10-06T21:04:47Z", "pushed_at": "2021-10-06T21:04:44Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 } ]