[ { "id": 381392691, "name": "CVE-2021-1675", "full_name": "yu2u\/CVE-2021-1675", "owner": { "login": "yu2u", "id": 25322880, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4", "html_url": "https:\/\/github.com\/yu2u" }, "html_url": "https:\/\/github.com\/yu2u\/CVE-2021-1675", "description": "CVE-2021-1675 exploit", "fork": false, "created_at": "2021-06-29T14:24:30Z", "updated_at": "2021-09-15T02:02:40Z", "pushed_at": "2021-06-29T14:26:25Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 381444656, "name": "CVE-2021-1675", "full_name": "cube0x0\/CVE-2021-1675", "owner": { "login": "cube0x0", "id": 39370848, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4", "html_url": "https:\/\/github.com\/cube0x0" }, "html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675", "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", "updated_at": "2023-07-04T13:10:18Z", "pushed_at": "2021-07-20T15:28:13Z", "stargazers_count": 1708, "watchers_count": 1708, "has_discussions": false, "forks_count": 590, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 590, "watchers": 1708, "score": 0, "subscribers_count": 45 }, { "id": 381799016, "name": "CVE-2021-1675", "full_name": "LaresLLC\/CVE-2021-1675", "owner": { "login": "LaresLLC", "id": 63059624, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4", "html_url": "https:\/\/github.com\/LaresLLC" }, "html_url": "https:\/\/github.com\/LaresLLC\/CVE-2021-1675", "description": "CVE-2021-1675 Detection Info", "fork": false, "created_at": "2021-06-30T18:32:17Z", "updated_at": "2023-06-30T09:26:01Z", "pushed_at": "2023-05-20T01:53:16Z", "stargazers_count": 217, "watchers_count": 217, "has_discussions": false, "forks_count": 38, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 38, "watchers": 217, "score": 0, "subscribers_count": 19 }, { "id": 381858715, "name": "patch-cve-2021-1675", "full_name": "kondah\/patch-cve-2021-1675", "owner": { "login": "kondah", "id": 7760108, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4", "html_url": "https:\/\/github.com\/kondah" }, "html_url": "https:\/\/github.com\/kondah\/patch-cve-2021-1675", "description": null, "fork": false, "created_at": "2021-06-30T23:39:21Z", "updated_at": "2021-10-24T04:47:24Z", "pushed_at": "2021-06-30T23:40:44Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 381971547, "name": "CVE-2021-1675-LPE-EXP", "full_name": "evilashz\/CVE-2021-1675-LPE-EXP", "owner": { "login": "evilashz", "id": 50722929, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4", "html_url": "https:\/\/github.com\/evilashz" }, "html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP", "description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527", "fork": false, "created_at": "2021-07-01T09:00:31Z", "updated_at": "2023-05-19T15:16:57Z", "pushed_at": "2021-07-02T10:47:36Z", "stargazers_count": 54, "watchers_count": 54, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-1675", "cve-2021-34527", "hacktool", "lpe", "printnightmare", "redteam", "redteam-tools", "windows" ], "visibility": "public", "forks": 20, "watchers": 54, "score": 0, "subscribers_count": 3 }, { "id": 381984439, "name": "CVE-2021-1675-LPE", "full_name": "hlldz\/CVE-2021-1675-LPE", "owner": { "login": "hlldz", "id": 16455559, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4", "html_url": "https:\/\/github.com\/hlldz" }, "html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE", "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-07-01T09:47:13Z", "updated_at": "2023-06-16T01:00:04Z", "pushed_at": "2021-07-05T06:46:12Z", "stargazers_count": 334, "watchers_count": 334, "has_discussions": false, "forks_count": 80, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cobaltstrike", "cve-2021-1675", "cve-2021-34527", "exploit", "lpe", "printnightmare", "reflectivedll", "windows" ], "visibility": "public", "forks": 80, "watchers": 334, "score": 0, "subscribers_count": 14 }, { "id": 382024474, "name": "CVE-2021-1675", "full_name": "puckiestyle\/CVE-2021-1675", "owner": { "login": "puckiestyle", "id": 57447087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", "html_url": "https:\/\/github.com\/puckiestyle" }, "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-01T12:24:19Z", "updated_at": "2022-11-24T11:13:27Z", "pushed_at": "2021-10-31T15:29:21Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 382050919, "name": "CVE-2021-1675_PrintNightMare", "full_name": "cybersecurityworks553\/CVE-2021-1675_PrintNightMare", "owner": { "login": "cybersecurityworks553", "id": 63910792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4", "html_url": "https:\/\/github.com\/cybersecurityworks553" }, "html_url": "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare", "description": null, "fork": false, "created_at": "2021-07-01T13:58:01Z", "updated_at": "2023-05-31T20:20:41Z", "pushed_at": "2021-11-18T16:46:46Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 19, "score": 0, "subscribers_count": 1 }, { "id": 382141130, "name": "CVE-2021-1675", "full_name": "tanarchytan\/CVE-2021-1675", "owner": { "login": "tanarchytan", "id": 2339027, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4", "html_url": "https:\/\/github.com\/tanarchytan" }, "html_url": "https:\/\/github.com\/tanarchytan\/CVE-2021-1675", "description": "Fix without disabling Print Spooler", "fork": false, "created_at": "2021-07-01T19:50:46Z", "updated_at": "2022-11-24T11:13:27Z", "pushed_at": "2021-07-02T04:32:18Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 382182179, "name": "CVE-2021-1675", "full_name": "calebstewart\/CVE-2021-1675", "owner": { "login": "calebstewart", "id": 7529189, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4", "html_url": "https:\/\/github.com\/calebstewart" }, "html_url": "https:\/\/github.com\/calebstewart\/CVE-2021-1675", "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", "updated_at": "2023-06-23T06:51:54Z", "pushed_at": "2021-07-05T08:54:06Z", "stargazers_count": 917, "watchers_count": 917, "has_discussions": false, "forks_count": 228, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 228, "watchers": 917, "score": 0, "subscribers_count": 26 }, { "id": 382200984, "name": "CVE-2021-1675-SCANNER", "full_name": "Leonidus0x10\/CVE-2021-1675-SCANNER", "owner": { "login": "Leonidus0x10", "id": 72128281, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4", "html_url": "https:\/\/github.com\/Leonidus0x10" }, "html_url": "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER", "description": "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare", "fork": false, "created_at": "2021-07-02T01:45:00Z", "updated_at": "2022-03-18T12:17:15Z", "pushed_at": "2021-07-02T01:52:46Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-1675", "exploit", "hacktheplanet", "python", "scanner" ], "visibility": "public", "forks": 3, "watchers": 11, "score": 0, "subscribers_count": 1 }, { "id": 382249207, "name": "CVE-2021-1675", "full_name": "thomasgeens\/CVE-2021-1675", "owner": { "login": "thomasgeens", "id": 2236721, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4", "html_url": "https:\/\/github.com\/thomasgeens" }, "html_url": "https:\/\/github.com\/thomasgeens\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-02T06:14:29Z", "updated_at": "2021-12-10T13:43:31Z", "pushed_at": "2021-07-02T06:14:39Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 382266932, "name": "CVE-2021-1675_CarbonBlack_HuntingQuery", "full_name": "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery", "owner": { "login": "mrezqi", "id": 2455832, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4", "html_url": "https:\/\/github.com\/mrezqi" }, "html_url": "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery", "description": null, "fork": false, "created_at": "2021-07-02T07:30:24Z", "updated_at": "2021-10-24T04:57:49Z", "pushed_at": "2021-07-02T08:01:07Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 382399375, "name": "CVE-2021-1675-PrintNightmare", "full_name": "killtr0\/CVE-2021-1675-PrintNightmare", "owner": { "login": "killtr0", "id": 22793707, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4", "html_url": "https:\/\/github.com\/killtr0" }, "html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare", "description": null, "fork": false, "created_at": "2021-07-02T16:12:15Z", "updated_at": "2021-12-08T22:23:08Z", "pushed_at": "2021-07-02T16:12:59Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 382407157, "name": "CVE-2021-1675", "full_name": "corelight\/CVE-2021-1675", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-02T16:44:24Z", "updated_at": "2022-06-03T07:11:00Z", "pushed_at": "2021-07-09T14:17:40Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 9, "score": 0, "subscribers_count": 7 }, { "id": 382418030, "name": "CVE-2021-1675", "full_name": "kougyokugentou\/CVE-2021-1675", "owner": { "login": "kougyokugentou", "id": 41278462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4", "html_url": "https:\/\/github.com\/kougyokugentou" }, "html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675", "description": "A small powershell script to disable print spooler service using desired state configuration", "fork": false, "created_at": "2021-07-02T17:29:04Z", "updated_at": "2021-12-22T20:12:23Z", "pushed_at": "2021-07-02T17:40:09Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 382425733, "name": "CVE-2021-1675", "full_name": "ptter23\/CVE-2021-1675", "owner": { "login": "ptter23", "id": 55167410, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4", "html_url": "https:\/\/github.com\/ptter23" }, "html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675", "description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS", "fork": false, "created_at": "2021-07-02T18:01:21Z", "updated_at": "2021-10-24T04:58:56Z", "pushed_at": "2021-07-02T18:07:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 382496518, "name": "cve-2021-1675-printnightmare", "full_name": "initconf\/cve-2021-1675-printnightmare", "owner": { "login": "initconf", "id": 4044729, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4", "html_url": "https:\/\/github.com\/initconf" }, "html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare", "description": "to catch cve-2021-1675-printnightmare", "fork": false, "created_at": "2021-07-03T01:04:06Z", "updated_at": "2021-10-24T06:03:36Z", "pushed_at": "2021-07-03T01:08:43Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 382609559, "name": "PrintNightmare", "full_name": "ozergoker\/PrintNightmare", "owner": { "login": "ozergoker", "id": 86879266, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4", "html_url": "https:\/\/github.com\/ozergoker" }, "html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare", "description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)", "fork": false, "created_at": "2021-07-03T12:25:21Z", "updated_at": "2022-06-10T10:41:21Z", "pushed_at": "2021-07-03T12:43:26Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 382815972, "name": "PrintNightmare-CVE-2021-1675", "full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675", "owner": { "login": "exploitblizzard", "id": 61627070, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4", "html_url": "https:\/\/github.com\/exploitblizzard" }, "html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675", "description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ", "fork": false, "created_at": "2021-07-04T09:50:39Z", "updated_at": "2023-02-22T14:39:26Z", "pushed_at": "2021-07-04T09:57:46Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 383128850, "name": "CVE-2021-1675", "full_name": "edsonjt81\/CVE-2021-1675", "owner": { "login": "edsonjt81", "id": 27496739, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4", "html_url": "https:\/\/github.com\/edsonjt81" }, "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-05T12:10:43Z", "updated_at": "2022-12-27T14:15:04Z", "pushed_at": "2022-12-27T14:15:54Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 383165321, "name": "PrintNightmare-LPE", "full_name": "sailay1996\/PrintNightmare-LPE", "owner": { "login": "sailay1996", "id": 16739401, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4", "html_url": "https:\/\/github.com\/sailay1996" }, "html_url": "https:\/\/github.com\/sailay1996\/PrintNightmare-LPE", "description": "CVE-2021-1675 (PrintNightmare)", "fork": false, "created_at": "2021-07-05T14:17:03Z", "updated_at": "2023-03-01T01:46:49Z", "pushed_at": "2021-07-05T14:34:34Z", "stargazers_count": 73, "watchers_count": 73, "has_discussions": false, "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "local-privilege-escalation", "printnightmare", "windows-exploitation", "windows-privilege-escalation" ], "visibility": "public", "forks": 29, "watchers": 73, "score": 0, "subscribers_count": 4 }, { "id": 383728669, "name": "PrintNightmare", "full_name": "JumpsecLabs\/PrintNightmare", "owner": { "login": "JumpsecLabs", "id": 49488209, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4", "html_url": "https:\/\/github.com\/JumpsecLabs" }, "html_url": "https:\/\/github.com\/JumpsecLabs\/PrintNightmare", "description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527", "fork": false, "created_at": "2021-07-07T08:32:09Z", "updated_at": "2023-02-01T21:50:16Z", "pushed_at": "2021-07-12T09:28:16Z", "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 20, "score": 0, "subscribers_count": 2 }, { "id": 384183711, "name": "CVE-2021-1675-Yara", "full_name": "bartimusprimed\/CVE-2021-1675-Yara", "owner": { "login": "bartimusprimed", "id": 465079, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/465079?v=4", "html_url": "https:\/\/github.com\/bartimusprimed" }, "html_url": "https:\/\/github.com\/bartimusprimed\/CVE-2021-1675-Yara", "description": null, "fork": false, "created_at": "2021-07-08T16:18:52Z", "updated_at": "2021-10-24T06:06:38Z", "pushed_at": "2021-07-08T16:19:45Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 384854320, "name": "cve-2021-1675", "full_name": "k8gege\/cve-2021-1675", "owner": { "login": "k8gege", "id": 42312878, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4", "html_url": "https:\/\/github.com\/k8gege" }, "html_url": "https:\/\/github.com\/k8gege\/cve-2021-1675", "description": null, "fork": false, "created_at": "2021-07-11T03:48:25Z", "updated_at": "2022-11-18T11:29:48Z", "pushed_at": "2021-07-11T03:49:44Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 16, "score": 0, "subscribers_count": 3 }, { "id": 385174791, "name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527", "full_name": "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527", "owner": { "login": "galoget", "id": 8353133, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4", "html_url": "https:\/\/github.com\/galoget" }, "html_url": "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527", "description": "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)", "fork": false, "created_at": "2021-07-12T08:18:40Z", "updated_at": "2021-10-24T06:07:00Z", "pushed_at": "2021-07-12T08:35:30Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 386724774, "name": "Microsoft-CVE-2021-1675", "full_name": "thalpius\/Microsoft-CVE-2021-1675", "owner": { "login": "thalpius", "id": 49958238, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49958238?v=4", "html_url": "https:\/\/github.com\/thalpius" }, "html_url": "https:\/\/github.com\/thalpius\/Microsoft-CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-16T18:06:05Z", "updated_at": "2022-04-20T11:31:25Z", "pushed_at": "2021-07-18T14:03:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 387202198, "name": "Microsoft-CVE-2021-1675", "full_name": "zha0\/Microsoft-CVE-2021-1675", "owner": { "login": "zha0", "id": 5314165, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5314165?v=4", "html_url": "https:\/\/github.com\/zha0" }, "html_url": "https:\/\/github.com\/zha0\/Microsoft-CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-18T15:00:27Z", "updated_at": "2021-12-07T10:08:12Z", "pushed_at": "2021-07-18T14:03:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 387694592, "name": "CVE-2021-1675", "full_name": "Winter3un\/CVE-2021-1675", "owner": { "login": "Winter3un", "id": 12570968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12570968?v=4", "html_url": "https:\/\/github.com\/Winter3un" }, "html_url": "https:\/\/github.com\/Winter3un\/CVE-2021-1675", "description": null, "fork": false, "created_at": "2021-07-20T06:26:45Z", "updated_at": "2021-10-24T06:07:21Z", "pushed_at": "2021-07-20T06:46:12Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 388427598, "name": "my-CVE-2021-1675", "full_name": "hahaleyile\/my-CVE-2021-1675", "owner": { "login": "hahaleyile", "id": 38727644, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4", "html_url": "https:\/\/github.com\/hahaleyile" }, "html_url": "https:\/\/github.com\/hahaleyile\/my-CVE-2021-1675", "description": "see https:\/\/github.com\/cube0x0\/CVE-2021-1675", "fork": false, "created_at": "2021-07-22T10:49:30Z", "updated_at": "2022-03-16T09:18:03Z", "pushed_at": "2021-08-13T15:15:05Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 402035048, "name": "CVE-2021-1675_RDL_LPE", "full_name": "mstxq17\/CVE-2021-1675_RDL_LPE", "owner": { "login": "mstxq17", "id": 29624427, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4", "html_url": "https:\/\/github.com\/mstxq17" }, "html_url": "https:\/\/github.com\/mstxq17\/CVE-2021-1675_RDL_LPE", "description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。", "fork": false, "created_at": "2021-09-01T11:25:04Z", "updated_at": "2023-05-19T07:54:41Z", "pushed_at": "2021-09-01T11:25:22Z", "stargazers_count": 140, "watchers_count": 140, "has_discussions": false, "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 25, "watchers": 140, "score": 0, "subscribers_count": 7 }, { "id": 410565318, "name": "PrintNightmare", "full_name": "ly4k\/PrintNightmare", "owner": { "login": "ly4k", "id": 53348818, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4", "html_url": "https:\/\/github.com\/ly4k" }, "html_url": "https:\/\/github.com\/ly4k\/PrintNightmare", "description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)", "fork": false, "created_at": "2021-09-26T13:53:10Z", "updated_at": "2023-06-23T14:54:12Z", "pushed_at": "2021-10-17T13:29:56Z", "stargazers_count": 149, "watchers_count": 149, "has_discussions": false, "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-1675", "cve-2021-34527" ], "visibility": "public", "forks": 28, "watchers": 149, "score": 0, "subscribers_count": 6 }, { "id": 410658843, "name": "SharpPN", "full_name": "Wra7h\/SharpPN", "owner": { "login": "Wra7h", "id": 60988551, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60988551?v=4", "html_url": "https:\/\/github.com\/Wra7h" }, "html_url": "https:\/\/github.com\/Wra7h\/SharpPN", "description": "C# PrintNightmare (CVE-2021-1675)", "fork": false, "created_at": "2021-09-26T20:46:23Z", "updated_at": "2023-03-08T23:19:59Z", "pushed_at": "2021-09-26T22:35:07Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 413951914, "name": "CVE-2021-1675-PrintNightmare", "full_name": "OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare", "owner": { "login": "OppressionBreedsResistance", "id": 60150959, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60150959?v=4", "html_url": "https:\/\/github.com\/OppressionBreedsResistance" }, "html_url": "https:\/\/github.com\/OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare", "description": "Working PowerShell POC", "fork": false, "created_at": "2021-10-05T19:24:23Z", "updated_at": "2023-05-05T16:12:01Z", "pushed_at": "2021-10-06T21:04:44Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 420590964, "name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler", "full_name": "5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler", "owner": { "login": "5l1v3r1", "id": 34143537, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4", "html_url": "https:\/\/github.com\/5l1v3r1" }, "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler", "description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ", "fork": false, "created_at": "2021-10-24T04:59:15Z", "updated_at": "2021-10-24T04:59:16Z", "pushed_at": "2021-07-05T05:41:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 435194981, "name": "NimNightmare", "full_name": "eversinc33\/NimNightmare", "owner": { "login": "eversinc33", "id": 51821028, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51821028?v=4", "html_url": "https:\/\/github.com\/eversinc33" }, "html_url": "https:\/\/github.com\/eversinc33\/NimNightmare", "description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)", "fork": false, "created_at": "2021-12-05T14:49:32Z", "updated_at": "2023-03-13T03:40:27Z", "pushed_at": "2021-12-05T14:51:28Z", "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 20, "score": 0, "subscribers_count": 2 }, { "id": 453589665, "name": "CVE-2021-1675", "full_name": "AndrewTrube\/CVE-2021-1675", "owner": { "login": "AndrewTrube", "id": 53106750, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53106750?v=4", "html_url": "https:\/\/github.com\/AndrewTrube" }, "html_url": "https:\/\/github.com\/AndrewTrube\/CVE-2021-1675", "description": "PrintNightmare Local Privilege Escalation ", "fork": false, "created_at": "2022-01-30T04:47:44Z", "updated_at": "2022-05-03T17:03:53Z", "pushed_at": "2022-01-30T04:54:23Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 462124046, "name": "cube0x0-CVE-2021-1675", "full_name": "TheJoyOfHacking\/cube0x0-CVE-2021-1675", "owner": { "login": "TheJoyOfHacking", "id": 99463221, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4", "html_url": "https:\/\/github.com\/TheJoyOfHacking" }, "html_url": "https:\/\/github.com\/TheJoyOfHacking\/cube0x0-CVE-2021-1675", "description": null, "fork": false, "created_at": "2022-02-22T03:32:14Z", "updated_at": "2022-02-22T03:32:28Z", "pushed_at": "2022-02-22T03:32:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 462124130, "name": "calebstewart-CVE-2021-1675", "full_name": "TheJoyOfHacking\/calebstewart-CVE-2021-1675", "owner": { "login": "TheJoyOfHacking", "id": 99463221, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4", "html_url": "https:\/\/github.com\/TheJoyOfHacking" }, "html_url": "https:\/\/github.com\/TheJoyOfHacking\/calebstewart-CVE-2021-1675", "description": null, "fork": false, "created_at": "2022-02-22T03:32:34Z", "updated_at": "2022-05-10T14:32:19Z", "pushed_at": "2022-02-22T03:32:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 557145507, "name": "cve-2021-1675", "full_name": "jj4152\/cve-2021-1675", "owner": { "login": "jj4152", "id": 115718872, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115718872?v=4", "html_url": "https:\/\/github.com\/jj4152" }, "html_url": "https:\/\/github.com\/jj4152\/cve-2021-1675", "description": null, "fork": false, "created_at": "2022-10-25T06:47:20Z", "updated_at": "2022-10-25T06:55:39Z", "pushed_at": "2022-11-07T12:26:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 582828686, "name": "PrintNightmare", "full_name": "r1skkam\/PrintNightmare", "owner": { "login": "r1skkam", "id": 58542375, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4", "html_url": "https:\/\/github.com\/r1skkam" }, "html_url": "https:\/\/github.com\/r1skkam\/PrintNightmare", "description": "Learn about the vulnerability known as PrintNightmare (CVE-2021-1675) and (CVE-2021-34527)", "fork": false, "created_at": "2022-12-28T01:29:31Z", "updated_at": "2022-12-28T01:29:31Z", "pushed_at": "2022-12-29T10:14:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]