mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
955 lines
No EOL
32 KiB
JSON
955 lines
No EOL
32 KiB
JSON
[
|
|
{
|
|
"id": 381392691,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "yu2u\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "yu2u",
|
|
"id": 25322880,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4",
|
|
"html_url": "https:\/\/github.com\/yu2u"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yu2u\/CVE-2021-1675",
|
|
"description": "CVE-2021-1675 exploit",
|
|
"fork": false,
|
|
"created_at": "2021-06-29T14:24:30Z",
|
|
"updated_at": "2021-09-15T02:02:40Z",
|
|
"pushed_at": "2021-06-29T14:26:25Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381444656,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "cube0x0\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "cube0x0",
|
|
"id": 39370848,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
|
|
"html_url": "https:\/\/github.com\/cube0x0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675",
|
|
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
|
"fork": false,
|
|
"created_at": "2021-06-29T17:24:14Z",
|
|
"updated_at": "2021-11-03T05:07:32Z",
|
|
"pushed_at": "2021-07-20T15:28:13Z",
|
|
"stargazers_count": 1441,
|
|
"watchers_count": 1441,
|
|
"forks_count": 529,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 529,
|
|
"watchers": 1441,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381799016,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "LaresLLC\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "LaresLLC",
|
|
"id": 63059624,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4",
|
|
"html_url": "https:\/\/github.com\/LaresLLC"
|
|
},
|
|
"html_url": "https:\/\/github.com\/LaresLLC\/CVE-2021-1675",
|
|
"description": "CVE-2021-1675 Detection Info",
|
|
"fork": false,
|
|
"created_at": "2021-06-30T18:32:17Z",
|
|
"updated_at": "2021-10-20T16:08:29Z",
|
|
"pushed_at": "2021-07-07T15:43:05Z",
|
|
"stargazers_count": 211,
|
|
"watchers_count": 211,
|
|
"forks_count": 34,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 34,
|
|
"watchers": 211,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381858715,
|
|
"name": "patch-cve-2021-1675",
|
|
"full_name": "kondah\/patch-cve-2021-1675",
|
|
"owner": {
|
|
"login": "kondah",
|
|
"id": 7760108,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4",
|
|
"html_url": "https:\/\/github.com\/kondah"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kondah\/patch-cve-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-06-30T23:39:21Z",
|
|
"updated_at": "2021-10-24T04:47:24Z",
|
|
"pushed_at": "2021-06-30T23:40:44Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381971547,
|
|
"name": "CVE-2021-1675-LPE-EXP",
|
|
"full_name": "evilashz\/CVE-2021-1675-LPE-EXP",
|
|
"owner": {
|
|
"login": "evilashz",
|
|
"id": 50722929,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
|
|
"html_url": "https:\/\/github.com\/evilashz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP",
|
|
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
|
|
"fork": false,
|
|
"created_at": "2021-07-01T09:00:31Z",
|
|
"updated_at": "2021-10-29T00:28:22Z",
|
|
"pushed_at": "2021-07-02T10:47:36Z",
|
|
"stargazers_count": 31,
|
|
"watchers_count": 31,
|
|
"forks_count": 17,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cve-2021-1675",
|
|
"cve-2021-34527",
|
|
"hacktool",
|
|
"lpe",
|
|
"printnightmare",
|
|
"redteam",
|
|
"redteam-tools",
|
|
"windows"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 17,
|
|
"watchers": 31,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381984439,
|
|
"name": "CVE-2021-1675-LPE",
|
|
"full_name": "hlldz\/CVE-2021-1675-LPE",
|
|
"owner": {
|
|
"login": "hlldz",
|
|
"id": 16455559,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
|
|
"html_url": "https:\/\/github.com\/hlldz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
|
|
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
|
|
"fork": false,
|
|
"created_at": "2021-07-01T09:47:13Z",
|
|
"updated_at": "2021-10-29T00:26:22Z",
|
|
"pushed_at": "2021-07-05T06:46:12Z",
|
|
"stargazers_count": 306,
|
|
"watchers_count": 306,
|
|
"forks_count": 74,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cobaltstrike",
|
|
"cve-2021-1675",
|
|
"cve-2021-34527",
|
|
"exploit",
|
|
"lpe",
|
|
"printnightmare",
|
|
"reflectivedll",
|
|
"windows"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 74,
|
|
"watchers": 306,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382024474,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "puckiestyle\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "puckiestyle",
|
|
"id": 57447087,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
|
"html_url": "https:\/\/github.com\/puckiestyle"
|
|
},
|
|
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-01T12:24:19Z",
|
|
"updated_at": "2021-10-31T15:29:24Z",
|
|
"pushed_at": "2021-10-31T15:29:21Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382050919,
|
|
"name": "CVE-2021-1675_PrintNightMare",
|
|
"full_name": "cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
|
|
"owner": {
|
|
"login": "cybersecurityworks553",
|
|
"id": 63910792,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
|
|
"html_url": "https:\/\/github.com\/cybersecurityworks553"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-01T13:58:01Z",
|
|
"updated_at": "2021-10-24T04:55:39Z",
|
|
"pushed_at": "2021-07-01T14:26:05Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 15,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382141130,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "tanarchytan\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "tanarchytan",
|
|
"id": 2339027,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4",
|
|
"html_url": "https:\/\/github.com\/tanarchytan"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tanarchytan\/CVE-2021-1675",
|
|
"description": "Fix without disabling Print Spooler",
|
|
"fork": false,
|
|
"created_at": "2021-07-01T19:50:46Z",
|
|
"updated_at": "2021-08-05T03:00:30Z",
|
|
"pushed_at": "2021-07-02T04:32:18Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382182179,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "calebstewart\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "calebstewart",
|
|
"id": 7529189,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4",
|
|
"html_url": "https:\/\/github.com\/calebstewart"
|
|
},
|
|
"html_url": "https:\/\/github.com\/calebstewart\/CVE-2021-1675",
|
|
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
|
"fork": false,
|
|
"created_at": "2021-07-01T23:45:58Z",
|
|
"updated_at": "2021-11-02T18:19:29Z",
|
|
"pushed_at": "2021-07-05T08:54:06Z",
|
|
"stargazers_count": 675,
|
|
"watchers_count": 675,
|
|
"forks_count": 181,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 181,
|
|
"watchers": 675,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382200984,
|
|
"name": "CVE-2021-1675-SCANNER",
|
|
"full_name": "Leonidus0x10\/CVE-2021-1675-SCANNER",
|
|
"owner": {
|
|
"login": "Leonidus0x10",
|
|
"id": 72128281,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4",
|
|
"html_url": "https:\/\/github.com\/Leonidus0x10"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER",
|
|
"description": "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare",
|
|
"fork": false,
|
|
"created_at": "2021-07-02T01:45:00Z",
|
|
"updated_at": "2021-10-24T04:55:52Z",
|
|
"pushed_at": "2021-07-02T01:52:46Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cve-2021-1675",
|
|
"exploit",
|
|
"hacktheplanet",
|
|
"python",
|
|
"scanner"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382249207,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "thomasgeens\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "thomasgeens",
|
|
"id": 2236721,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4",
|
|
"html_url": "https:\/\/github.com\/thomasgeens"
|
|
},
|
|
"html_url": "https:\/\/github.com\/thomasgeens\/CVE-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-02T06:14:29Z",
|
|
"updated_at": "2021-10-24T04:57:01Z",
|
|
"pushed_at": "2021-07-02T06:14:39Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382266932,
|
|
"name": "CVE-2021-1675_CarbonBlack_HuntingQuery",
|
|
"full_name": "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
|
|
"owner": {
|
|
"login": "mrezqi",
|
|
"id": 2455832,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4",
|
|
"html_url": "https:\/\/github.com\/mrezqi"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-02T07:30:24Z",
|
|
"updated_at": "2021-10-24T04:57:49Z",
|
|
"pushed_at": "2021-07-02T08:01:07Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382399375,
|
|
"name": "CVE-2021-1675-PrintNightmare",
|
|
"full_name": "killtr0\/CVE-2021-1675-PrintNightmare",
|
|
"owner": {
|
|
"login": "killtr0",
|
|
"id": 22793707,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4",
|
|
"html_url": "https:\/\/github.com\/killtr0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-02T16:12:15Z",
|
|
"updated_at": "2021-10-24T04:58:00Z",
|
|
"pushed_at": "2021-07-02T16:12:59Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382407157,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "corelight\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "corelight",
|
|
"id": 21672558,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
|
"html_url": "https:\/\/github.com\/corelight"
|
|
},
|
|
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-02T16:44:24Z",
|
|
"updated_at": "2021-10-24T04:58:16Z",
|
|
"pushed_at": "2021-07-09T14:17:40Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 6,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382418030,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "kougyokugentou\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "kougyokugentou",
|
|
"id": 41278462,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4",
|
|
"html_url": "https:\/\/github.com\/kougyokugentou"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675",
|
|
"description": "A small powershell script to disable print spooler service using desired state configuration",
|
|
"fork": false,
|
|
"created_at": "2021-07-02T17:29:04Z",
|
|
"updated_at": "2021-10-24T04:58:36Z",
|
|
"pushed_at": "2021-07-02T17:40:09Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382425733,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "ptter23\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "ptter23",
|
|
"id": 55167410,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4",
|
|
"html_url": "https:\/\/github.com\/ptter23"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675",
|
|
"description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
|
|
"fork": false,
|
|
"created_at": "2021-07-02T18:01:21Z",
|
|
"updated_at": "2021-10-24T04:58:56Z",
|
|
"pushed_at": "2021-07-02T18:07:45Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382466613,
|
|
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
|
"full_name": "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
|
"owner": {
|
|
"login": "gohrenberg",
|
|
"id": 80491750,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4",
|
|
"html_url": "https:\/\/github.com\/gohrenberg"
|
|
},
|
|
"html_url": "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
|
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
|
|
"fork": false,
|
|
"created_at": "2021-07-02T21:18:11Z",
|
|
"updated_at": "2021-10-24T04:59:14Z",
|
|
"pushed_at": "2021-07-05T05:41:30Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cve-2021-1675",
|
|
"printnightmare"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382496518,
|
|
"name": "cve-2021-1675-printnightmare",
|
|
"full_name": "initconf\/cve-2021-1675-printnightmare",
|
|
"owner": {
|
|
"login": "initconf",
|
|
"id": 4044729,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
|
|
"html_url": "https:\/\/github.com\/initconf"
|
|
},
|
|
"html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
|
|
"description": "to catch cve-2021-1675-printnightmare",
|
|
"fork": false,
|
|
"created_at": "2021-07-03T01:04:06Z",
|
|
"updated_at": "2021-10-24T06:03:36Z",
|
|
"pushed_at": "2021-07-03T01:08:43Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382609559,
|
|
"name": "PrintNightmare",
|
|
"full_name": "ozergoker\/PrintNightmare",
|
|
"owner": {
|
|
"login": "ozergoker",
|
|
"id": 86879266,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
|
|
"html_url": "https:\/\/github.com\/ozergoker"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare",
|
|
"description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)",
|
|
"fork": false,
|
|
"created_at": "2021-07-03T12:25:21Z",
|
|
"updated_at": "2021-10-24T06:03:49Z",
|
|
"pushed_at": "2021-07-03T12:43:26Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382815972,
|
|
"name": "PrintNightmare-CVE-2021-1675",
|
|
"full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
|
"owner": {
|
|
"login": "exploitblizzard",
|
|
"id": 61627070,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
|
"html_url": "https:\/\/github.com\/exploitblizzard"
|
|
},
|
|
"html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
|
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
|
|
"fork": false,
|
|
"created_at": "2021-07-04T09:50:39Z",
|
|
"updated_at": "2021-10-24T06:05:59Z",
|
|
"pushed_at": "2021-07-04T09:57:46Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 383128850,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "edsonjt81\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "edsonjt81",
|
|
"id": 27496739,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4",
|
|
"html_url": "https:\/\/github.com\/edsonjt81"
|
|
},
|
|
"html_url": "https:\/\/github.com\/edsonjt81\/CVE-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-05T12:10:43Z",
|
|
"updated_at": "2021-10-24T06:06:09Z",
|
|
"pushed_at": "2021-07-05T12:10:55Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 383165321,
|
|
"name": "PrintNightmare-LPE",
|
|
"full_name": "sailay1996\/PrintNightmare-LPE",
|
|
"owner": {
|
|
"login": "sailay1996",
|
|
"id": 16739401,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
|
|
"html_url": "https:\/\/github.com\/sailay1996"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sailay1996\/PrintNightmare-LPE",
|
|
"description": "CVE-2021-1675 (PrintNightmare)",
|
|
"fork": false,
|
|
"created_at": "2021-07-05T14:17:03Z",
|
|
"updated_at": "2021-11-02T08:23:34Z",
|
|
"pushed_at": "2021-07-05T14:34:34Z",
|
|
"stargazers_count": 60,
|
|
"watchers_count": 60,
|
|
"forks_count": 25,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"local-privilege-escalation",
|
|
"printnightmare",
|
|
"windows-exploitation",
|
|
"windows-privilege-escalation"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 25,
|
|
"watchers": 60,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 383728669,
|
|
"name": "PrintNightmare",
|
|
"full_name": "JumpsecLabs\/PrintNightmare",
|
|
"owner": {
|
|
"login": "JumpsecLabs",
|
|
"id": 49488209,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4",
|
|
"html_url": "https:\/\/github.com\/JumpsecLabs"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JumpsecLabs\/PrintNightmare",
|
|
"description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
|
|
"fork": false,
|
|
"created_at": "2021-07-07T08:32:09Z",
|
|
"updated_at": "2021-10-24T06:06:27Z",
|
|
"pushed_at": "2021-07-12T09:28:16Z",
|
|
"stargazers_count": 17,
|
|
"watchers_count": 17,
|
|
"forks_count": 9,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 9,
|
|
"watchers": 17,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 384183711,
|
|
"name": "CVE-2021-1675-Yara",
|
|
"full_name": "bartimus-primed\/CVE-2021-1675-Yara",
|
|
"owner": {
|
|
"login": "bartimus-primed",
|
|
"id": 465079,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/465079?v=4",
|
|
"html_url": "https:\/\/github.com\/bartimus-primed"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bartimus-primed\/CVE-2021-1675-Yara",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-08T16:18:52Z",
|
|
"updated_at": "2021-10-24T06:06:38Z",
|
|
"pushed_at": "2021-07-08T16:19:45Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 384854320,
|
|
"name": "cve-2021-1675",
|
|
"full_name": "k8gege\/cve-2021-1675",
|
|
"owner": {
|
|
"login": "k8gege",
|
|
"id": 42312878,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
|
|
"html_url": "https:\/\/github.com\/k8gege"
|
|
},
|
|
"html_url": "https:\/\/github.com\/k8gege\/cve-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-11T03:48:25Z",
|
|
"updated_at": "2021-11-01T18:25:49Z",
|
|
"pushed_at": "2021-07-11T03:49:44Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 16,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 385174791,
|
|
"name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
|
"full_name": "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
|
"owner": {
|
|
"login": "galoget",
|
|
"id": 8353133,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
|
|
"html_url": "https:\/\/github.com\/galoget"
|
|
},
|
|
"html_url": "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
|
"description": "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)",
|
|
"fork": false,
|
|
"created_at": "2021-07-12T08:18:40Z",
|
|
"updated_at": "2021-10-24T06:07:00Z",
|
|
"pushed_at": "2021-07-12T08:35:30Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 386724774,
|
|
"name": "Microsoft-CVE-2021-1675",
|
|
"full_name": "thalpius\/Microsoft-CVE-2021-1675",
|
|
"owner": {
|
|
"login": "thalpius",
|
|
"id": 49958238,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49958238?v=4",
|
|
"html_url": "https:\/\/github.com\/thalpius"
|
|
},
|
|
"html_url": "https:\/\/github.com\/thalpius\/Microsoft-CVE-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-16T18:06:05Z",
|
|
"updated_at": "2021-10-24T06:07:11Z",
|
|
"pushed_at": "2021-07-18T14:03:05Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 387694592,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "Winter3un\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "Winter3un",
|
|
"id": 12570968,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12570968?v=4",
|
|
"html_url": "https:\/\/github.com\/Winter3un"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Winter3un\/CVE-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-20T06:26:45Z",
|
|
"updated_at": "2021-10-24T06:07:21Z",
|
|
"pushed_at": "2021-07-20T06:46:12Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 388427598,
|
|
"name": "my-CVE-2021-1675",
|
|
"full_name": "hahaleyile\/my-CVE-2021-1675",
|
|
"owner": {
|
|
"login": "hahaleyile",
|
|
"id": 38727644,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4",
|
|
"html_url": "https:\/\/github.com\/hahaleyile"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hahaleyile\/my-CVE-2021-1675",
|
|
"description": "see https:\/\/github.com\/cube0x0\/CVE-2021-1675",
|
|
"fork": false,
|
|
"created_at": "2021-07-22T10:49:30Z",
|
|
"updated_at": "2021-10-24T06:07:33Z",
|
|
"pushed_at": "2021-08-13T15:15:05Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 402035048,
|
|
"name": "CVE-2021-1675_RDL_LPE",
|
|
"full_name": "mstxq17\/CVE-2021-1675_RDL_LPE",
|
|
"owner": {
|
|
"login": "mstxq17",
|
|
"id": 29624427,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4",
|
|
"html_url": "https:\/\/github.com\/mstxq17"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mstxq17\/CVE-2021-1675_RDL_LPE",
|
|
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
|
|
"fork": false,
|
|
"created_at": "2021-09-01T11:25:04Z",
|
|
"updated_at": "2021-10-24T06:07:42Z",
|
|
"pushed_at": "2021-09-01T11:25:22Z",
|
|
"stargazers_count": 102,
|
|
"watchers_count": 102,
|
|
"forks_count": 15,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 15,
|
|
"watchers": 102,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 410565318,
|
|
"name": "PrintNightmare",
|
|
"full_name": "ly4k\/PrintNightmare",
|
|
"owner": {
|
|
"login": "ly4k",
|
|
"id": 53348818,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
|
|
"html_url": "https:\/\/github.com\/ly4k"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ly4k\/PrintNightmare",
|
|
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
|
|
"fork": false,
|
|
"created_at": "2021-09-26T13:53:10Z",
|
|
"updated_at": "2021-11-02T10:11:47Z",
|
|
"pushed_at": "2021-10-17T13:29:56Z",
|
|
"stargazers_count": 81,
|
|
"watchers_count": 81,
|
|
"forks_count": 16,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cve-2021-1675",
|
|
"cve-2021-34527"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 16,
|
|
"watchers": 81,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 410658843,
|
|
"name": "SharpPN",
|
|
"full_name": "Wra7h\/SharpPN",
|
|
"owner": {
|
|
"login": "Wra7h",
|
|
"id": 60988551,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60988551?v=4",
|
|
"html_url": "https:\/\/github.com\/Wra7h"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Wra7h\/SharpPN",
|
|
"description": "C# PrintNightmare (CVE-2021-1675)",
|
|
"fork": false,
|
|
"created_at": "2021-09-26T20:46:23Z",
|
|
"updated_at": "2021-10-24T06:07:57Z",
|
|
"pushed_at": "2021-09-26T22:35:07Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 413951914,
|
|
"name": "CVE-2021-1675-PrintNightmare",
|
|
"full_name": "OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
|
|
"owner": {
|
|
"login": "OppressionBreedsResistance",
|
|
"id": 60150959,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60150959?v=4",
|
|
"html_url": "https:\/\/github.com\/OppressionBreedsResistance"
|
|
},
|
|
"html_url": "https:\/\/github.com\/OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
|
|
"description": "Working PowerShell POC",
|
|
"fork": false,
|
|
"created_at": "2021-10-05T19:24:23Z",
|
|
"updated_at": "2021-10-24T06:08:06Z",
|
|
"pushed_at": "2021-10-06T21:04:44Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
}
|
|
] |