Help - attempting to replicate CVE-2021-1675 print nightmare

This page summarizes the projects mentioned and recommended in the original post on reddit.com/r/netsecstudents

Our great sponsors
  • Scout APM - Less time debugging, more time building
  • SonarLint - Deliver Cleaner and Safer Code - Right in Your IDE of Choice!
  • SaaSHub - Software Alternatives and Reviews
  • CVE-2021-1675

    C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 (by cube0x0)

    i Tried this (https://github.com/cube0x0/CVE-2021-1675) and its worked.

  • CVE-2021-1675

    Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)

  • Scout APM

    Less time debugging, more time building. Scout APM allows you to find and fix performance issues with no hassle. Now with error monitoring and external services monitoring, Scout is a developer's best friend when it comes to application development.

  • Metasploit

    Metasploit Framework

    Is your system patched with June 8, 2021 security updates? If yes, there might be chances to get failed with with PoC. I found a metasploit module in github. Check if this helps. https://github.com/rapid7/metasploit-framework/pull/15385

  • WinPwn

    Automation for internal Windows Penetrationtest / AD-Security

  • mimikatz

    A little tool to play with Windows security

  • ItWasAllADream

    A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts