C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
翻译 - CVE-2021-1675/PrintNightmare 的 C# 和 Impacket 实现
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
翻译 - CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) 的纯 PowerShell 实现
Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
翻译 - CVE-2021-1675 的本地提权版
CVE-2021-1675 Detection Info
翻译 - CVE-2021-1675 检测信息
CVE-2021-1675 (PrintNightmare)
Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)
PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。
PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 ...
ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
CVE-2021-4034 1day
翻译 - CVE-2021-4034 1 天
CVE-2021-40444 PoC
翻译 - CVE-2021-40444 PoC
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
翻译 - 在磁盘和 Java 存档文件中查找易受攻击的 Log4j2 版本(Log4Shell CVE-2021-44228 和 CVE-2021-45046)
CVE-2021-1732 Exploit
翻译 - CVE-2021-1732利用
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
CVE-2021-41773 playground
翻译 - CVE-2021-41773 操场
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
翻译 - 利用 CVE-2021-42278 和 CVE-2021-42287 冒充标准域用户的 DA
CVE-2021-40444
翻译 - CVE-2021-40444
CVE 2021-21315 PoC
翻译 - CVE 2021-21315很少
CVE-2021-40444 Sample
翻译 - CVE-2021-40444 示例