Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-42278

Description

Active Directory Domain Services Elevation of Privilege Vulnerability

POC

Reference

No PoCs from references.

Github

- https://github.com/0x5900FX/Tools-Script

- https://github.com/0x7n6/OSCP

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xZipp0/OSCP

- https://github.com/0xsyr0/OSCP

- https://github.com/20142995/sectool

- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AleHelp/Windows-Pentesting-cheatsheet

- https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Ascotbe/Kernelhub

- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Awrrays/Pentest-Tips

- https://github.com/AyoubSEG/Pentest-AD

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Chrisync/CVE-Scanner

- https://github.com/Cruxer8Mech/Idk

- https://github.com/Cyberappy/Sigma-rules

- https://github.com/DanielBodnar/my-awesome-stars

- https://github.com/DanielFEXKEX/CVE-Scanner

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/EvilAnne/2021-Read-article

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/GhostTroops/TOP

- https://github.com/Gyarbij/xknow_infosec

- https://github.com/H0j3n/EzpzCheatSheet

- https://github.com/HackingCost/AD_Pentest

- https://github.com/IAMinZoho/sAMAccountName-Spoofing

- https://github.com/Ignitetechnologies/Windows-Privilege-Escalation

- https://github.com/Iveco/xknow_infosec

- https://github.com/JDArmy/GetDomainAdmin

- https://github.com/JERRY123S/all-poc

- https://github.com/JFR-C/Windows-Penetration-Testing

- https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation

- https://github.com/Jean-Francois-C/Windows-Penetration-Testing

- https://github.com/Kryo1/Pentest_Note

- https://github.com/Ly0nt4r/OSCP

- https://github.com/MGamalCYSEC/Active-Directory-Enumeration-and-Attacks

- https://github.com/Mehedi-Babu/active_directory_chtsht

- https://github.com/MizaruIT/PENTAD-TOOLKIT

- https://github.com/MizaruIT/PENTADAY_TOOLKIT

- https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/MrE-Fog/ldapfw

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/NxPnch/Windows-Privesc

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Qazeer/OffensivePythonPipeline

- https://github.com/RACHO-PRG/Windows_Escalada_Privilegios

- https://github.com/ReAbout/web-sec

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/Ridter/noPac

- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SYRTI/POC_to_review

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries

- https://github.com/SirElmard/ethical_hacking

- https://github.com/T0mcat3r/ALinks

- https://github.com/Threekiii/Awesome-Redteam

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/TryA9ain/noPac

- https://github.com/ViniciusClement/OSCP_2025

- https://github.com/VishuGahlyan/OSCP

- https://github.com/WazeHell/sam-the-admin

- https://github.com/Whiteh4tWolf/Attack-Defense

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XiaoliChan/Invoke-sAMSpoofing

- https://github.com/YossiSassi/hAcKtive-Directory-Forensics

- https://github.com/ZyberPatrol/Active-Directory

- https://github.com/andreafiorella/red-team-scenario

- https://github.com/angui0O/Awesome-Redteam

- https://github.com/aymankhder/AD-attack-defense

- https://github.com/aymankhder/AD-esploitation-cheatsheet

- https://github.com/aymankhder/Windows-Penetration-Testing

- https://github.com/bhataasim1/AD-Attack-Defence

- https://github.com/blackend/Diario-RedTem

- https://github.com/bohack/SecurityTools

- https://github.com/brimstone/stars

- https://github.com/csb21jb/Pentesting-Notes

- https://github.com/cube0x0/noPac

- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/cyb3rpeace/noPac

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cybersecurityworks553/noPac-detection

- https://github.com/danielbodnar/my-awesome-stars

- https://github.com/devmehedi101/bugbounty-CVE-Report

- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/e-hakson/OSCP

- https://github.com/edsonjt81/Windows-Privilege-Escalation

- https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/eljosep/OSCP-Guide

- https://github.com/exfilt/CheatSheet

- https://github.com/fazilbaig1/oscp

- https://github.com/getanehAl/Windows-Penetration-Testing

- https://github.com/gkazimiarovich/CS-IDP-PatternId-table

- https://github.com/goddemondemongod/Sec-Interview

- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-

- https://github.com/hangchuanin/Intranet_penetration_history

- https://github.com/hegusung/netscan

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/iamramahibrah/AD-Attacks-and-Defend

- https://github.com/ihebski/A-Red-Teamer-diaries

- https://github.com/infosecn1nja/AD-Attack-Defense

- https://github.com/jbmihoub/all-poc

- https://github.com/jenriquezv/OSCP-Cheat-Sheets-AD

- https://github.com/jitmondal1/OSCP

- https://github.com/k8gege/Ladon

- https://github.com/keshavskn123/CDAC

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/knightswd/NoPacScan

- https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest

- https://github.com/lawbyte/Windows-and-Active-Directory

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/ly4k/Pachine

- https://github.com/lyshark/Windows-exploits

- https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack

- https://github.com/mdecrevoisier/SIGMA-detection-rules

- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense

- https://github.com/mranv/adPentest

- https://github.com/nadeemali79/AD-Attack-Defense

- https://github.com/nholuongut/active-directory-exploitation-cheat-sheet

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/open-source-agenda/new-open-source-projects

- https://github.com/oscpname/OSCP_cheat

- https://github.com/paramint/AD-Attack-Defense

- https://github.com/parth45/cheatsheet

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/puckiestyle/A-Red-Teamer-diaries

- https://github.com/puckiestyle/sam-the-admin

- https://github.com/pwnlog/ALinks

- https://github.com/pwnlog/PAD

- https://github.com/pwnlog/PuroAD

- https://github.com/pwnlog/PurpAD

- https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/retr0-13/AD-Attack-Defense

- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/retr0-13/noPac

- https://github.com/revanmalang/OSCP

- https://github.com/ricardojba/Invoke-noPac

- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG

- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/s3mPr1linux/JUST_WALKING_DOG

- https://github.com/safebuffer/sam-the-admin

- https://github.com/sdogancesur/log4j_github_repository

- https://github.com/securi3ytalent/bugbounty-CVE-Report

- https://github.com/shahidshaik786/ActiveDirectory_Attacks_CRTP_OSCP

- https://github.com/shengshengli/GetDomainAdmin

- https://github.com/soosmile/POC

- https://github.com/sponkmonk/Ladon_english_update

- https://github.com/suljov/Windows-and-Active-Directory

- https://github.com/suljov/Windwos-and-Active-Directory

- https://github.com/suljov/suljov-Pentest-ctf-cheat-sheet

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/theguly/stars

- https://github.com/tomatimmy/AD-attack-enumerate

- https://github.com/trhacknon/Pocingit

- https://github.com/tufanturhan/Red-Teamer-Diaries

- https://github.com/tufanturhan/sam-the-admin

- https://github.com/txuswashere/OSCP

- https://github.com/undefined-name12/Cheat-Sheet-Active-Directory

- https://github.com/vanhohen/ADNinja

- https://github.com/voker2311/Infra-Security-101

- https://github.com/waterrr/noPac

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoami-chmod777/Hacking-Articles-Windows-Privilege-Escalation

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xhref/OSCP

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/ycdxsb/WindowsPrivilegeEscalation

- https://github.com/yovelo98/OSCP-Cheatsheet

- https://github.com/zecool/cve

- https://github.com/zeronetworks/ldapfw

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zulloper/cve-poc