[ { "name": "CVE-2021-1675", "full_name": "cube0x0/CVE-2021-1675", "html_url": "https://github.com/cube0x0/CVE-2021-1675", "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527", "stargazers_count": 1872, "forks_count": 583, "created_at": "2021-06-29T17:24:14Z" }, { "name": "CVE-2021-1675", "full_name": "calebstewart/CVE-2021-1675", "html_url": "https://github.com/calebstewart/CVE-2021-1675", "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "stargazers_count": 1043, "forks_count": 229, "created_at": "2021-07-01T23:45:58Z" }, { "name": "CVE-2021-1675-LPE", "full_name": "hlldz/CVE-2021-1675-LPE", "html_url": "https://github.com/hlldz/CVE-2021-1675-LPE", "description": "Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527", "stargazers_count": 333, "forks_count": 79, "created_at": "2021-07-01T09:47:13Z" }, { "name": "CVE-2021-1675", "full_name": "LaresLLC/CVE-2021-1675", "html_url": "https://github.com/LaresLLC/CVE-2021-1675", "description": "CVE-2021-1675 Detection Info", "stargazers_count": 215, "forks_count": 38, "created_at": "2021-06-30T18:32:17Z" }, { "name": "CVE-2021-1675_RDL_LPE", "full_name": "mstxq17/CVE-2021-1675_RDL_LPE", "html_url": "https://github.com/mstxq17/CVE-2021-1675_RDL_LPE", "description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。", "stargazers_count": 148, "forks_count": 26, "created_at": "2021-09-01T11:25:04Z" }, { "name": "CVE-2021-1675-LPE-EXP", "full_name": "evilashz/CVE-2021-1675-LPE-EXP", "html_url": "https://github.com/evilashz/CVE-2021-1675-LPE-EXP", "description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527", "stargazers_count": 58, "forks_count": 21, "created_at": "2021-07-01T09:00:31Z" }, { "name": "CVE-2021-1675_PrintNightMare", "full_name": "cybersecurityworks553/CVE-2021-1675_PrintNightMare", "html_url": "https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare", "description": null, "stargazers_count": 23, "forks_count": 13, "created_at": "2021-07-01T13:58:01Z" }, { "name": "cve-2021-1675", "full_name": "k8gege/cve-2021-1675", "html_url": "https://github.com/k8gege/cve-2021-1675", "description": null, "stargazers_count": 16, "forks_count": 3, "created_at": "2021-07-11T03:48:25Z" }, { "name": "CVE-2021-1675-SCANNER", "full_name": "Leonidus0x10/CVE-2021-1675-SCANNER", "html_url": "https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER", "description": "Vulnerability Scanner for CVE-2021-1675/PrintNightmare", "stargazers_count": 10, "forks_count": 3, "created_at": "2021-07-02T01:45:00Z" }, { "name": "CVE-2021-1675", "full_name": "corelight/CVE-2021-1675", "html_url": "https://github.com/corelight/CVE-2021-1675", "description": null, "stargazers_count": 9, "forks_count": 4, "created_at": "2021-07-02T16:44:24Z" }, { "name": "CVE-2021-34527-1675", "full_name": "CnOxx1/CVE-2021-34527-1675", "html_url": "https://github.com/CnOxx1/CVE-2021-34527-1675", "description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!", "stargazers_count": 6, "forks_count": 1, "created_at": "2021-07-04T16:09:18Z" }, { "name": "PrintNightmare-CVE-2021-1675", "full_name": "exploitblizzard/PrintNightmare-CVE-2021-1675", "html_url": "https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675", "description": "Youtube : https://youtu.be/Zr0KjYDSFKQ", "stargazers_count": 5, "forks_count": 4, "created_at": "2021-07-04T09:50:39Z" }, { "name": "CVE-2021-1675", "full_name": "AndrewTrube/CVE-2021-1675", "html_url": "https://github.com/AndrewTrube/CVE-2021-1675", "description": "PrintNightmare Local Privilege Escalation ", "stargazers_count": 5, "forks_count": 1, "created_at": "2022-01-30T04:47:44Z" }, { "name": "my-CVE-2021-1675", "full_name": "hahaleyile/my-CVE-2021-1675", "html_url": "https://github.com/hahaleyile/my-CVE-2021-1675", "description": "see https://github.com/cube0x0/CVE-2021-1675", "stargazers_count": 3, "forks_count": 3, "created_at": "2021-07-22T10:49:30Z" }, { "name": "patch-cve-2021-1675", "full_name": "kondah/patch-cve-2021-1675", "html_url": "https://github.com/kondah/patch-cve-2021-1675", "description": null, "stargazers_count": 3, "forks_count": 2, "created_at": "2021-06-30T23:39:21Z" }, { "name": "CVE-2021-1675", "full_name": "thomasgeens/CVE-2021-1675", "html_url": "https://github.com/thomasgeens/CVE-2021-1675", "description": null, "stargazers_count": 3, "forks_count": 1, "created_at": "2021-07-02T06:14:29Z" }, { "name": "CVE-2021-1675", "full_name": "yu2u/CVE-2021-1675", "html_url": "https://github.com/yu2u/CVE-2021-1675", "description": "CVE-2021-1675 exploit", "stargazers_count": 2, "forks_count": 1, "created_at": "2021-06-29T14:24:30Z" }, { "name": "calebstewart-CVE-2021-1675", "full_name": "TheJoyOfHacking/calebstewart-CVE-2021-1675", "html_url": "https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675", "description": null, "stargazers_count": 2, "forks_count": 0, "created_at": "2022-02-22T03:32:34Z" }, { "name": "CVE-2021-1675-Yara", "full_name": "bartimusprimed/CVE-2021-1675-Yara", "html_url": "https://github.com/bartimusprimed/CVE-2021-1675-Yara", "description": null, "stargazers_count": 2, "forks_count": 1, "created_at": "2021-07-08T16:18:52Z" }, { "name": "CVE-2021-1675-PrintNightmare", "full_name": "killtr0/CVE-2021-1675-PrintNightmare", "html_url": "https://github.com/killtr0/CVE-2021-1675-PrintNightmare", "description": null, "stargazers_count": 2, "forks_count": 1, "created_at": "2021-07-02T16:12:15Z" }, { "name": "CVE-2021-1675", "full_name": "puckiestyle/CVE-2021-1675", "html_url": "https://github.com/puckiestyle/CVE-2021-1675", "description": null, "stargazers_count": 1, "forks_count": 5, "created_at": "2021-07-01T12:24:19Z" }, { "name": "CVE-2021-1675-PrintNightmare", "full_name": "OppressionBreedsResistance/CVE-2021-1675-PrintNightmare", "html_url": "https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare", "description": "Working PowerShell POC", "stargazers_count": 1, "forks_count": 3, "created_at": "2021-10-05T19:24:23Z" }, { "name": "CVE-2021-1675-CVE-2021-34527", "full_name": "whoami-chmod777/CVE-2021-1675-CVE-2021-34527", "html_url": "https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527", "description": null, "stargazers_count": 1, "forks_count": 0, "created_at": "2024-02-12T20:54:51Z" }, { "name": "CVE-2021-1675", "full_name": "Winter3un/CVE-2021-1675", "html_url": "https://github.com/Winter3un/CVE-2021-1675", "description": null, "stargazers_count": 1, "forks_count": 1, "created_at": "2021-07-20T06:26:45Z" }, { "name": "CVE-2021-1675", "full_name": "kougyokugentou/CVE-2021-1675", "html_url": "https://github.com/kougyokugentou/CVE-2021-1675", "description": "A small powershell script to disable print spooler service using desired state configuration", "stargazers_count": 1, "forks_count": 1, "created_at": "2021-07-02T17:29:04Z" }, { "name": "CVE-2021-1675", "full_name": "tanarchytan/CVE-2021-1675", "html_url": "https://github.com/tanarchytan/CVE-2021-1675", "description": "Fix without disabling Print Spooler", "stargazers_count": 0, "forks_count": 3, "created_at": "2021-07-01T19:50:46Z" }, { "name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527", "full_name": "galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527", "html_url": "https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527", "description": "CVE-2021-1675 / CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)", "stargazers_count": 0, "forks_count": 2, "created_at": "2021-07-12T08:18:40Z" }, { "name": "Microsoft-CVE-2021-1675", "full_name": "zha0/Microsoft-CVE-2021-1675", "html_url": "https://github.com/zha0/Microsoft-CVE-2021-1675", "description": null, "stargazers_count": 0, "forks_count": 2, "created_at": "2021-07-18T15:00:27Z" }, { "name": "cve-2021-1675", "full_name": "jj4152/cve-2021-1675", "html_url": "https://github.com/jj4152/cve-2021-1675", "description": null, "stargazers_count": 0, "forks_count": 1, "created_at": "2022-10-25T06:47:20Z" }, { "name": "CVE-2021-1675", "full_name": "ptter23/CVE-2021-1675", "html_url": "https://github.com/ptter23/CVE-2021-1675", "description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS", "stargazers_count": 0, "forks_count": 1, "created_at": "2021-07-02T18:01:21Z" } ]