CVE-2021-1675
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 (by cube0x0)
CVE-2021-1675
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) (by calebstewart)
CVE-2021-1675 | CVE-2021-1675 | |
---|---|---|
7 | 6 | |
1,791 | 968 | |
- | - | |
0.0 | 0.0 | |
almost 3 years ago | almost 3 years ago | |
C# | PowerShell | |
- | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CVE-2021-1675
Posts with mentions or reviews of CVE-2021-1675.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-07-02.
-
Researchers accidentally release exploit code for new Windows ‘zero-day’ bug PrintNightmare
Thst is the advice until they release a patch, which I would assume will be Tuesday... but we'll see. I also read turning UAC on prevents the exploit from working. If the print spooler isn't available remotely, then it is just an LPE vuln . You can get more details here https://github.com/cube0x0/CVE-2021-1675. And yeah this is hard cause every company does printing differently, definitely remove from your DCs asap though.
- C# and Impacket implementation of CVE-2021-1675/PrintNightmare
-
Help - attempting to replicate CVE-2021-1675 print nightmare
i Tried this (https://github.com/cube0x0/CVE-2021-1675) and its worked.
- cube0x0/CVE-2021-1675
- Impacket implementation of CVE-2021-1675
- PrintNightmare (CVE-2021-1675): Remote code execution in Windows Spooler Service
CVE-2021-1675
Posts with mentions or reviews of CVE-2021-1675.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-07-02.
What are some alternatives?
When comparing CVE-2021-1675 and CVE-2021-1675 you can also consider the following projects:
Metasploit - Metasploit Framework
mimikatz - A little tool to play with Windows security
ItWasAllADream - A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
WinPwn - Automation for internal Windows Penetrationtest / AD-Security
PrintNightmare