Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-1675

Description

Windows Print Spooler Remote Code Execution Vulnerability

POC

Reference

- http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html

- http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html

Github

- https://github.com/000Tonio/cve-2021-1675

- https://github.com/0housefly0/Printnightmare

- https://github.com/0x727/usefull-elevation-of-privilege

- https://github.com/0x7n6/OSCP

- https://github.com/0xHunterr/OSCP-Study-Notes

- https://github.com/0xHunterr/OSCP-Studying-Notes

- https://github.com/0xMarcio/cve

- https://github.com/0xSs0rZ/Windows_Exploit

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xZipp0/OSCP

- https://github.com/0xaniketB/HackTheBox-Driver

- https://github.com/0xffee/Layer2HackerDao

- https://github.com/0xsyr0/OSCP

- https://github.com/20142995/sectool

- https://github.com/3gstudent/Invoke-BuildAnonymousSMBServer

- https://github.com/410g0n3/Active-Directory-Cheatsheet-Attacks

- https://github.com/4RG0S/2021-Summer-Some-Day-Exploit

- https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler

- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1

- https://github.com/61106960/ClipySharpPack

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AbdullahZuhair21/OSCP-Notes

- https://github.com/Aesir9/helpinghand

- https://github.com/AleHelp/Windows-Pentesting-cheatsheet

- https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/AndrewTrube/CVE-2021-1675

- https://github.com/Andromeda254/cve

- https://github.com/Anonymous-Family/Zero-day-scanning

- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/B34MR/zeroscan

- https://github.com/BADR0b0t33/PrintAttck

- https://github.com/BC-SECURITY/Moriarty

- https://github.com/BOFs/CobaltStrike

- https://github.com/BeetleChunks/SpoolSploit

- https://github.com/CPester05/Exploits

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CharlesTheGreat77/FreddyKrueger

- https://github.com/CnOxx1/CVE-2021-34527-1675

- https://github.com/Cyberappy/Sigma-rules

- https://github.com/D3Ext/PentestDictionary

- https://github.com/DARKSTUFF-LAB/SpoolSploit

- https://github.com/DLL00P/CVE-2021-1675

- https://github.com/DanielBodnar/awesome-stars

- https://github.com/DanielBodnar/my-awesome-stars

- https://github.com/DenizSe/CVE-2021-34527

- https://github.com/Dr4ks/PJPT_CheatSheet

- https://github.com/EASI-Sec/EasiWeapons.sh

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/Falcon712/Windows_Hardening_Project

- https://github.com/G0urmetD/PJPT-Notes

- https://github.com/Getshell/CobaltStrike

- https://github.com/GhostTroops/TOP

- https://github.com/GlacierGossip/PrintNightmare

- https://github.com/Gyarbij/xknow_infosec

- https://github.com/H0j3n/EzpzCheatSheet

- https://github.com/HackingCost/AD_Pentest

- https://github.com/HarshRajSinghania/smbvulnrecon

- https://github.com/Hatcat123/my_stars

- https://github.com/Iveco/xknow_infosec

- https://github.com/JERRY123S/all-poc

- https://github.com/JFR-C/Boot2root-CTFs-Writeups

- https://github.com/JFR-C/Windows-Penetration-Testing

- https://github.com/Jalexander798/JA_Tools-0xsp-Mongoose

- https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation

- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups

- https://github.com/Jean-Francois-C/Windows-Penetration-Testing

- https://github.com/JohnHammond/CVE-2021-34527

- https://github.com/JumpsecLabs/PrintNightmare

- https://github.com/Kar0nX/ADtools

- https://github.com/Kryo1/Pentest_Note

- https://github.com/LaresLLC/CVE-2021-1675

- https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER

- https://github.com/Ly0nt4r/OSCP

- https://github.com/MGamalCYSEC/Active-Directory-Enumeration-and-Attacks

- https://github.com/Mehedi-Babu/active_directory_chtsht

- https://github.com/Mikasazero/Cobalt-Strike

- https://github.com/MizaruIT/PENTAD-TOOLKIT

- https://github.com/MizaruIT/PENTADAY_TOOLKIT

- https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/MolotovC2/arsenal

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/NickSanzotta/zeroscan

- https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Qazeer/OffensivePythonPipeline

- https://github.com/RarW0lf/PrintNightmare-BB-Payload

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/S3cur3Th1sSh1t/PowerSharpPack

- https://github.com/S3cur3Th1sSh1t/WinPwn

- https://github.com/SYRTI/POC_to_review

- https://github.com/SafeItConsulting/WinTools

- https://github.com/SaintsConnor/Exploits

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SecuProject/NetworkInfoGather

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/SexurityAnalyst/WinPwn

- https://github.com/SexyBeast233/SecBooks

- https://github.com/SirElmard/ethical_hacking

- https://github.com/SofianeHamlaoui/Conti-Clear

- https://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675

- https://github.com/Steels03/PrintNightmare-Driver-Checker

- https://github.com/T0mcat3r/ALinks

- https://github.com/TheCyberFang/website

- https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675

- https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675

- https://github.com/TheLastochka/pentest

- https://github.com/TheWatchDog13/PJPT-Cheat_Sheet

- https://github.com/Threekiii/Awesome-Redteam

- https://github.com/TirthSharaf/Internal-Pentest-cheat-sheet

- https://github.com/Tomparte/PrintNightmare

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/VK9D/PrintNightmare

- https://github.com/ViniciusClement/OSCP_2025

- https://github.com/VishuGahlyan/OSCP

- https://github.com/VoiidByte/Impacket

- https://github.com/WatPow/anadoc

- https://github.com/WhooAmii/POC_to_review

- https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation

- https://github.com/Winter3un/CVE-2021-1675

- https://github.com/Wra7h/SharpPN

- https://github.com/X-3306/my-all-notes

- https://github.com/X-The-Mystic/xframe

- https://github.com/YangSirrr/YangsirStudyPlan

- https://github.com/aatharvauti/AD

- https://github.com/abdullah89255/Metasploit-Framework-

- https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database

- https://github.com/afine-com/research

- https://github.com/afinepl/research

- https://github.com/akyuksel/tryhackme-all-rooms-database

- https://github.com/alvesnet-oficial/microsoft-vulnerabilidades

- https://github.com/alvesnet-suporte/microsoft-vulnerabilidades

- https://github.com/angui0O/Awesome-Redteam

- https://github.com/arifhidayat65/PrintNightmare

- https://github.com/auduongxuan/CVE-2022-26809

- https://github.com/aymankhder/AD-esploitation-cheatsheet

- https://github.com/aymankhder/Windows-Penetration-Testing

- https://github.com/b4rtik/SharpKatz

- https://github.com/bartimus-primed/CVE-2021-1675-Yara

- https://github.com/bartimusprimed/CVE-2021-1675-Yara

- https://github.com/bhassani/Recent-CVE

- https://github.com/binganao/vulns-2022

- https://github.com/boh/RedCsharp

- https://github.com/brimstone/stars

- https://github.com/byt3bl33d3r/ItWasAllADream

- https://github.com/calebstewart/CVE-2021-1675

- https://github.com/cfalta/MicrosoftWontFixList

- https://github.com/chosenonehacks/Red-Team-tools-and-usefull-links

- https://github.com/ciwen3/PNPT

- https://github.com/clearbluejar/cve-markdown-charts

- https://github.com/corelight/CVE-2021-1675

- https://github.com/crimsoncore/SharpKatz

- https://github.com/crtaylor315/PrintNightmare-Before-Halloween

- https://github.com/csb21jb/Pentesting-Notes

- https://github.com/cube0x0/CVE-2021-1675

- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/cyb3rpeace/CVE-2021-34527

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cyberfreaq/configs

- https://github.com/cyberfreaq/kali-prep

- https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare

- https://github.com/cycoslave/ITSec-toolkit

- https://github.com/d0nkeyk0ng787/PrintNightmare-POC

- https://github.com/danielbodnar/my-awesome-stars

- https://github.com/demilson/spoolsv

- https://github.com/devkw/PentestDictionary

- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/dxnboy/redteam

- https://github.com/e-hakson/OSCP

- https://github.com/edisonrivera/HackTheBox

- https://github.com/edsonjt81/CVE-2021-1675

- https://github.com/edsonjt81/SpoolSploit

- https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/elinakrmova/WinPwn

- https://github.com/eljosep/OSCP-Guide

- https://github.com/emtee40/win-pwn

- https://github.com/eng-amarante/CyberSecurity

- https://github.com/eversinc33/NimNightmare

- https://github.com/evilashz/CVE-2021-1675-LPE-EXP

- https://github.com/exfilt/CheatSheet

- https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675

- https://github.com/f4T1H21/HackTheBox-Writeups

- https://github.com/fazilbaig1/oscp

- https://github.com/fei9747/Awesome-CobaltStrike

- https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527

- https://github.com/gecr07/HTB-Academy

- https://github.com/getanehAl/Windows-Penetration-Testing

- https://github.com/giterlizzi/secdb-feeds

- https://github.com/gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler

- https://github.com/goldenscale/GS_GithubMirror

- https://github.com/gyaansastra/Print-Nightmare-LPE

- https://github.com/hack-parthsharma/RedTeam-Cheetsheet

- https://github.com/hack-parthsharma/WinPwn

- https://github.com/hahaleyile/my-CVE-2021-1675

- https://github.com/hegusung/netscan

- https://github.com/hktalent/TOP

- https://github.com/hlldz/CVE-2021-1675-LPE

- https://github.com/huike007/penetration_poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/iamramahibrah/AD-Attacks-and-Defend

- https://github.com/initconf/cve-2021-1675-printnightmare

- https://github.com/izj007/wechat

- https://github.com/jbmihoub/all-poc

- https://github.com/jenriquezv/OSCP-Cheat-Sheets-AD

- https://github.com/jitmondal1/OSCP

- https://github.com/jj4152/cve-2021-1675

- https://github.com/jor6PS/ad-from-0-to-Hero

- https://github.com/k0imet/CVE-POCs

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/k8gege/CVE-2021-40444

- https://github.com/k8gege/Ladon

- https://github.com/k8gege/cve-2021-1675

- https://github.com/kdandy/WinPwn

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups

- https://github.com/killtr0/CVE-2021-1675-PrintNightmare

- https://github.com/kondah/patch-cve-2021-1675

- https://github.com/kougyokugentou/CVE-2021-1675

- https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest

- https://github.com/lawbyte/Windows-and-Active-Directory

- https://github.com/lawrenceamer/0xsp-Mongoose

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lvoxpq/aaaxxqqq

- https://github.com/ly4k/PrintNightmare

- https://github.com/lyshark/Windows-exploits

- https://github.com/m8sec/CVE-2021-34527

- https://github.com/mahdictf/PrivEsc-Techniques

- https://github.com/malwaremily/infosec-news-briefs

- https://github.com/manas3c/CVE-POC

- https://github.com/mayormaier/printnightmare-fixes

- https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack

- https://github.com/mdecrevoisier/SIGMA-detection-rules

- https://github.com/melons135/DagdaBins

- https://github.com/merlinepedra/CobaltStrike

- https://github.com/merlinepedra/POWERSHARPPACK

- https://github.com/merlinepedra/SpoolSploit

- https://github.com/merlinepedra25/CobaltStrike

- https://github.com/merlinepedra25/POWERSHARPPACK

- https://github.com/merlinepedra25/SpoolSploit

- https://github.com/morkin1792/security-tests

- https://github.com/mranv/adPentest

- https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery

- https://github.com/mstxq17/CVE-2021-1675_RDL_LPE

- https://github.com/mxdelta/Up_Privel_windows

- https://github.com/n0-traces/cve_monitor

- https://github.com/n0rmh3ll/AD-checklist

- https://github.com/n1sh1th/CVE-POC

- https://github.com/nathanealm/PrintNightmare-Exploit

- https://github.com/naujpr/printnightmare

- https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527

- https://github.com/netkid123/WinPwn-1

- https://github.com/nholuongut/active-directory-exploitation-cheat-sheet

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nullx3d/PaypScan

- https://github.com/numanturle/PrintNightmare

- https://github.com/orgTestCodacy11KRepos110MB/repo-9265-PowerSharpPack

- https://github.com/oscpname/AD_PowerSharpPack

- https://github.com/oscpname/OSCP_cheat

- https://github.com/outflanknl/PrintNightmare

- https://github.com/ozergoker/PrintNightmare

- https://github.com/ozzy76/cveCheck

- https://github.com/parth45/cheatsheet

- https://github.com/peckre/PNCVE-Win10-20H2-Exploit

- https://github.com/penetrarnya-tm/WeaponizeKali.sh

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/ptter23/CVE-2021-1675

- https://github.com/puckiestyle/CVE-2021-1675

- https://github.com/pwninx/WinPwn

- https://github.com/pwnlog/ALinks

- https://github.com/pwnlog/PAD

- https://github.com/pwnlog/PuroAD

- https://github.com/pwnlog/PurpAD

- https://github.com/r1skkam/PrintNightmare

- https://github.com/raithedavion/PrintNightmare

- https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/real-acmkan/docker-printernightmare

- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/retr0-13/PrintNightmare

- https://github.com/retr0-13/WinPwn

- https://github.com/rettbl/Useful

- https://github.com/revanmalang/OSCP

- https://github.com/rnbochsr/atlas

- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG

- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/s3mPr1linux/JUST_WALKING_DOG

- https://github.com/sabrinalupsan/pentesting-active-directory

- https://github.com/sailay1996/PrintNightmare-LPE

- https://github.com/sardarahmed705/Pentest-Dictionary

- https://github.com/saurav2shukla/vulnerabilitiesPoC

- https://github.com/schecthellraiser606/oscp_cheet

- https://github.com/schecthellraiser606/pentest_cheet

- https://github.com/seeu-inspace/easyg

- https://github.com/sh7alward/CVE-20121-34527-nightmare

- https://github.com/shadowdevnotreal/Awesome-CobaltStrike

- https://github.com/sinfulz/JustGetDA

- https://github.com/snovvcrash/WeaponizeKali.sh

- https://github.com/soosmile/POC

- https://github.com/sponkmonk/Ladon_english_update

- https://github.com/strikoder/CTFS

- https://github.com/suljov/Windows-and-Active-Directory

- https://github.com/suljov/Windwos-and-Active-Directory

- https://github.com/suljov/suljov-Pentest-ctf-cheat-sheet

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/tanarchytan/CVE-2021-1675

- https://github.com/thalpius/Microsoft-CVE-2021-1675

- https://github.com/thomasgeens/CVE-2021-1675

- https://github.com/tomatimmy/AD-attack-enumerate

- https://github.com/trganda/starrlist

- https://github.com/trhacknon/Pocingit

- https://github.com/trixiahorner/printnightmare-try-hack-me

- https://github.com/trixiahorner/trixiahorner

- https://github.com/txuswashere/OSCP

- https://github.com/txuswashere/Pentesting-Windows

- https://github.com/uhub/awesome-c-sharp

- https://github.com/uk32htb/Active-Directory

- https://github.com/undefined-name12/Cheat-Sheet-Active-Directory

- https://github.com/vanhohen/ADNinja

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-

- https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527

- https://github.com/whoami13apt/files2

- https://github.com/whoforget/CVE-POC

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/wlfrag/printnightmare

- https://github.com/wowter-code/PowerSharpPack

- https://github.com/wsummerhill/CobaltStrike_RedTeam_CheatSheet

- https://github.com/xbufu/PrintNightmareCheck

- https://github.com/xhref/OSCP

- https://github.com/xthemystik/xframe

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yerdaulete/PJPT-CheatSheet

- https://github.com/yigitturak/Forensics

- https://github.com/youwizard/CVE-POC

- https://github.com/yovelo98/OSCP-Cheatsheet

- https://github.com/yu2u/CVE-2021-1675

- https://github.com/zecool/cve

- https://github.com/zer0yu/Awesome-CobaltStrike

- https://github.com/zeze-zeze/2021iThome

- https://github.com/zha0/Microsoft-CVE-2021-1675

- https://github.com/zux0x3a/0xsp-Mongoose