272 lines
No EOL
9.3 KiB
JSON
272 lines
No EOL
9.3 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "cube0x0/CVE-2021-1675",
|
||
"html_url": "https://github.com/cube0x0/CVE-2021-1675",
|
||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527",
|
||
"stargazers_count": 1872,
|
||
"forks_count": 583,
|
||
"created_at": "2021-06-29T17:24:14Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "calebstewart/CVE-2021-1675",
|
||
"html_url": "https://github.com/calebstewart/CVE-2021-1675",
|
||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||
"stargazers_count": 1043,
|
||
"forks_count": 229,
|
||
"created_at": "2021-07-01T23:45:58Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675-LPE",
|
||
"full_name": "hlldz/CVE-2021-1675-LPE",
|
||
"html_url": "https://github.com/hlldz/CVE-2021-1675-LPE",
|
||
"description": "Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527",
|
||
"stargazers_count": 333,
|
||
"forks_count": 79,
|
||
"created_at": "2021-07-01T09:47:13Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "LaresLLC/CVE-2021-1675",
|
||
"html_url": "https://github.com/LaresLLC/CVE-2021-1675",
|
||
"description": "CVE-2021-1675 Detection Info",
|
||
"stargazers_count": 215,
|
||
"forks_count": 38,
|
||
"created_at": "2021-06-30T18:32:17Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675_RDL_LPE",
|
||
"full_name": "mstxq17/CVE-2021-1675_RDL_LPE",
|
||
"html_url": "https://github.com/mstxq17/CVE-2021-1675_RDL_LPE",
|
||
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。",
|
||
"stargazers_count": 148,
|
||
"forks_count": 26,
|
||
"created_at": "2021-09-01T11:25:04Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675-LPE-EXP",
|
||
"full_name": "evilashz/CVE-2021-1675-LPE-EXP",
|
||
"html_url": "https://github.com/evilashz/CVE-2021-1675-LPE-EXP",
|
||
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
|
||
"stargazers_count": 58,
|
||
"forks_count": 21,
|
||
"created_at": "2021-07-01T09:00:31Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675_PrintNightMare",
|
||
"full_name": "cybersecurityworks553/CVE-2021-1675_PrintNightMare",
|
||
"html_url": "https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare",
|
||
"description": null,
|
||
"stargazers_count": 23,
|
||
"forks_count": 13,
|
||
"created_at": "2021-07-01T13:58:01Z"
|
||
},
|
||
{
|
||
"name": "cve-2021-1675",
|
||
"full_name": "k8gege/cve-2021-1675",
|
||
"html_url": "https://github.com/k8gege/cve-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 16,
|
||
"forks_count": 3,
|
||
"created_at": "2021-07-11T03:48:25Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675-SCANNER",
|
||
"full_name": "Leonidus0x10/CVE-2021-1675-SCANNER",
|
||
"html_url": "https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER",
|
||
"description": "Vulnerability Scanner for CVE-2021-1675/PrintNightmare",
|
||
"stargazers_count": 10,
|
||
"forks_count": 3,
|
||
"created_at": "2021-07-02T01:45:00Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "corelight/CVE-2021-1675",
|
||
"html_url": "https://github.com/corelight/CVE-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 9,
|
||
"forks_count": 4,
|
||
"created_at": "2021-07-02T16:44:24Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-34527-1675",
|
||
"full_name": "CnOxx1/CVE-2021-34527-1675",
|
||
"html_url": "https://github.com/CnOxx1/CVE-2021-34527-1675",
|
||
"description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!",
|
||
"stargazers_count": 6,
|
||
"forks_count": 1,
|
||
"created_at": "2021-07-04T16:09:18Z"
|
||
},
|
||
{
|
||
"name": "PrintNightmare-CVE-2021-1675",
|
||
"full_name": "exploitblizzard/PrintNightmare-CVE-2021-1675",
|
||
"html_url": "https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675",
|
||
"description": "Youtube : https://youtu.be/Zr0KjYDSFKQ",
|
||
"stargazers_count": 5,
|
||
"forks_count": 4,
|
||
"created_at": "2021-07-04T09:50:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "AndrewTrube/CVE-2021-1675",
|
||
"html_url": "https://github.com/AndrewTrube/CVE-2021-1675",
|
||
"description": "PrintNightmare Local Privilege Escalation ",
|
||
"stargazers_count": 5,
|
||
"forks_count": 1,
|
||
"created_at": "2022-01-30T04:47:44Z"
|
||
},
|
||
{
|
||
"name": "my-CVE-2021-1675",
|
||
"full_name": "hahaleyile/my-CVE-2021-1675",
|
||
"html_url": "https://github.com/hahaleyile/my-CVE-2021-1675",
|
||
"description": "see https://github.com/cube0x0/CVE-2021-1675",
|
||
"stargazers_count": 3,
|
||
"forks_count": 3,
|
||
"created_at": "2021-07-22T10:49:30Z"
|
||
},
|
||
{
|
||
"name": "patch-cve-2021-1675",
|
||
"full_name": "kondah/patch-cve-2021-1675",
|
||
"html_url": "https://github.com/kondah/patch-cve-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 3,
|
||
"forks_count": 2,
|
||
"created_at": "2021-06-30T23:39:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "thomasgeens/CVE-2021-1675",
|
||
"html_url": "https://github.com/thomasgeens/CVE-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 3,
|
||
"forks_count": 1,
|
||
"created_at": "2021-07-02T06:14:29Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "yu2u/CVE-2021-1675",
|
||
"html_url": "https://github.com/yu2u/CVE-2021-1675",
|
||
"description": "CVE-2021-1675 exploit",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2021-06-29T14:24:30Z"
|
||
},
|
||
{
|
||
"name": "calebstewart-CVE-2021-1675",
|
||
"full_name": "TheJoyOfHacking/calebstewart-CVE-2021-1675",
|
||
"html_url": "https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 0,
|
||
"created_at": "2022-02-22T03:32:34Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675-Yara",
|
||
"full_name": "bartimusprimed/CVE-2021-1675-Yara",
|
||
"html_url": "https://github.com/bartimusprimed/CVE-2021-1675-Yara",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2021-07-08T16:18:52Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675-PrintNightmare",
|
||
"full_name": "killtr0/CVE-2021-1675-PrintNightmare",
|
||
"html_url": "https://github.com/killtr0/CVE-2021-1675-PrintNightmare",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2021-07-02T16:12:15Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "puckiestyle/CVE-2021-1675",
|
||
"html_url": "https://github.com/puckiestyle/CVE-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 5,
|
||
"created_at": "2021-07-01T12:24:19Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675-PrintNightmare",
|
||
"full_name": "OppressionBreedsResistance/CVE-2021-1675-PrintNightmare",
|
||
"html_url": "https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare",
|
||
"description": "Working PowerShell POC",
|
||
"stargazers_count": 1,
|
||
"forks_count": 3,
|
||
"created_at": "2021-10-05T19:24:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675-CVE-2021-34527",
|
||
"full_name": "whoami-chmod777/CVE-2021-1675-CVE-2021-34527",
|
||
"html_url": "https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2024-02-12T20:54:51Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "Winter3un/CVE-2021-1675",
|
||
"html_url": "https://github.com/Winter3un/CVE-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 1,
|
||
"created_at": "2021-07-20T06:26:45Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "kougyokugentou/CVE-2021-1675",
|
||
"html_url": "https://github.com/kougyokugentou/CVE-2021-1675",
|
||
"description": "A small powershell script to disable print spooler service using desired state configuration",
|
||
"stargazers_count": 1,
|
||
"forks_count": 1,
|
||
"created_at": "2021-07-02T17:29:04Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "tanarchytan/CVE-2021-1675",
|
||
"html_url": "https://github.com/tanarchytan/CVE-2021-1675",
|
||
"description": "Fix without disabling Print Spooler",
|
||
"stargazers_count": 0,
|
||
"forks_count": 3,
|
||
"created_at": "2021-07-01T19:50:46Z"
|
||
},
|
||
{
|
||
"name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
||
"full_name": "galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
||
"html_url": "https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
||
"description": "CVE-2021-1675 / CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)",
|
||
"stargazers_count": 0,
|
||
"forks_count": 2,
|
||
"created_at": "2021-07-12T08:18:40Z"
|
||
},
|
||
{
|
||
"name": "Microsoft-CVE-2021-1675",
|
||
"full_name": "zha0/Microsoft-CVE-2021-1675",
|
||
"html_url": "https://github.com/zha0/Microsoft-CVE-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 2,
|
||
"created_at": "2021-07-18T15:00:27Z"
|
||
},
|
||
{
|
||
"name": "cve-2021-1675",
|
||
"full_name": "jj4152/cve-2021-1675",
|
||
"html_url": "https://github.com/jj4152/cve-2021-1675",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2022-10-25T06:47:20Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-1675",
|
||
"full_name": "ptter23/CVE-2021-1675",
|
||
"html_url": "https://github.com/ptter23/CVE-2021-1675",
|
||
"description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2021-07-02T18:01:21Z"
|
||
}
|
||
] |