nomisec
WORKING POC
1,964 stars
by cube0x0 · remote
https://github.com/cube0x0/CVE-2021-1675
This repository contains a functional Python exploit for CVE-2021-1675 (PrintNightmare), which leverages the Windows Print Spooler service to achieve remote code execution (RCE) by abusing the RpcAddPrinterDriverEx function to load a malicious DLL from a remote share.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Valid domain credentials or NTLM hashes · Access to the target's SMB service (TCP 445) · A writable SMB share hosting the malicious DLL
nomisec
WORKING POC
1,089 stars
by calebstewart · local
https://github.com/calebstewart/CVE-2021-1675
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which leverages a vulnerability in the Windows Print Spooler service to achieve local privilege escalation (LPE) by loading a malicious DLL as a printer driver. The exploit includes a custom DLL payload that creates a new local administrator user with a specified password.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Windows Print Spooler service running · Sufficient permissions to add a printer driver
nomisec
WORKING POC
327 stars
by hlldz · poc
https://github.com/hlldz/CVE-2021-1675-LPE
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2021-1675 (PrintNightmare), leveraging the Windows Print Spooler service vulnerability. The exploit includes reflective DLL loading and has been tested on Windows Server 2019 Standard.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (Windows Server 2019 Standard)
No auth needed
Prerequisites:
Access to a vulnerable Windows system with the Print Spooler service running · Ability to execute the exploit binary with a payload DLL path as an argument
nomisec
WRITEUP
215 stars
by LaresLLC · poc
https://github.com/LaresLLC/CVE-2021-1675
This repository provides detection and mitigation guidance for CVE-2021-1675 and CVE-2021-34527 (PrintNightmare), including Sysmon configurations, Splunk queries, and workaround fixes. It does not contain exploit code but offers technical details on vulnerability remediation.
Classification
Writeup 100%
Target:
Windows Print Spooler
Auth required
Prerequisites:
Access to vulnerable Windows system with Print Spooler enabled · Authenticated user privileges
nomisec
WORKING POC
206 stars
by ly4k · remote
https://github.com/ly4k/PrintNightmare
This repository contains a functional Python exploit for CVE-2021-1675 (PrintNightmare), leveraging Impacket to perform remote DLL loading via the Windows Print Spooler service. It supports multiple modes including vulnerability checking, driver enumeration, and DLL deployment for remote code execution.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service (affects multiple Windows versions)
Auth required
Prerequisites:
Valid credentials for the target system · Network access to the target's SMB and RPRN services
nomisec
WORKING POC
148 stars
by mstxq17 · local
https://github.com/mstxq17/CVE-2021-1675_RDL_LPE
This repository contains a Cobalt Strike plugin for exploiting CVE-2021-1675 (PrintNightmare) to achieve local privilege escalation (LPE) on Windows systems. The exploit leverages reflective DLL loading and driver name obfuscation to bypass Defender/EDR.
Classification
Working Poc 90%
Target:
Windows Server 2009, Windows Server 2016 (64-bit)
Auth required
Prerequisites:
Cobalt Strike framework · Administrative access to load the plugin · Vulnerable Windows system
nomisec
WORKING POC
77 stars
by sailay1996 · local
https://github.com/sailay1996/PrintNightmare-LPE
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2021-1675 (PrintNightmare). The exploit leverages the Windows Print Spooler service to load a malicious DLL (vlib.dll) via AddPrinterDriverEx, which spawns a reverse shell with elevated privileges.
Classification
Working Poc 95%
Target:
Windows Print Spooler (Windows 10, Windows Server 2012)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · Windows Print Spooler service running
nomisec
WORKING POC
58 stars
by evilashz · poc
https://github.com/evilashz/CVE-2021-1675-LPE-EXP
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2021-1675, leveraging the Windows Print Spooler service to load a malicious DLL. The exploit dynamically retrieves the printer driver path using `EnumPrinterDriversW` and abuses `AddPrinterDriverEx` to achieve privilege escalation.
Classification
Working Poc 95%
Target:
Windows Print Spooler (Windows Server 2008 R2, Windows Server 2012 R2, Windows 10)
No auth needed
Prerequisites:
A malicious DLL to load · Local access to the target system
nomisec
SCANNER
23 stars
by cybersecurityworks553 · remote
https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare
This repository contains a Python script that scans for the presence of the PrintNightmare vulnerability (CVE-2021-1675) by checking if the target system exposes the Print System Remote Protocol via RPC. It does not exploit the vulnerability but detects potential exposure.
Classification
Scanner 95%
Target:
Windows Print Spooler Service
No auth needed
Prerequisites:
Network access to target system · RPC/EPM service accessible on port 135
nomisec
WRITEUP
19 stars
by JumpsecLabs · poc
https://github.com/JumpsecLabs/PrintNightmare
This repository contains a detailed technical analysis of the PrintNightmare vulnerability (CVE-2021-1675), focusing on network traffic analysis and exploit mechanics. It includes a PCAP analysis, exploit re-creation steps, and detection insights, but does not contain functional exploit code.
Classification
Writeup 100%
Target:
Microsoft Windows Print Spooler
Auth required
Prerequisites:
Access to a vulnerable Windows system with Print Spooler service running · Valid credentials for authentication
nomisec
WORKING POC
18 stars
by eversinc33 · local
https://github.com/eversinc33/NimNightmare
This repository contains a functional exploit for CVE-2021-1675, a local privilege escalation vulnerability in the Windows Print Spooler service. The exploit leverages the `AddPrinterDriverEx` API to load a malicious DLL with SYSTEM privileges.
Classification
Working Poc 95%
Target:
Windows Print Spooler (spoolsv.exe)
Auth required
Prerequisites:
Local access to the target system · Ability to compile Nim code · A malicious DLL generated via msfvenom or similar tool
nomisec
WRITEUP
16 stars
by k8gege · poc
https://github.com/k8gege/cve-2021-1675
This repository provides a detailed technical writeup on CVE-2021-1675, a Windows Print Spooler privilege escalation vulnerability. It includes affected versions, usage examples, and references to external PoCs, but does not contain functional exploit code.
Classification
Writeup 90%
Target:
Windows Print Spooler
No auth needed
Prerequisites:
Access to a vulnerable Windows system with Print Spooler service running
nomisec
WORKING POC
10 stars
by Wra7h · local
https://github.com/Wra7h/SharpPN
This repository contains a functional C# exploit for CVE-2021-1675 (PrintNightmare), which leverages the Windows Print Spooler service to achieve arbitrary code execution via DLL injection. The exploit uses the AddPrinterDriverEx API to load a malicious DLL specified by the user.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
No auth needed
Prerequisites:
A malicious DLL to load · Access to the target system's Print Spooler service
nomisec
SCANNER
9 stars
by corelight · poc
https://github.com/corelight/CVE-2021-1675
This repository provides a Zeek script and Suricata rules to detect DCE RPC events related to the PrintNightmare vulnerability (CVE-2021-1675). It does not contain exploit code but focuses on detection mechanisms for the vulnerability.
Classification
Scanner 90%
Target:
Windows Print Spooler
No auth needed
Prerequisites:
Network access to the target system · Zeek or Suricata installed for detection
nomisec
SCANNER
9 stars
by Leonidus0x10 · poc
https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER
This repository contains a Python script that scans for CVE-2021-1675 by checking if the MS-RPRN service is exposed via RPC. It uses rpcdump.py to query targets and logs vulnerable hosts to a file.
Classification
Scanner 95%
Target:
Windows Print Spooler (MS-RPRN)
No auth needed
Prerequisites:
rpcdump.py · list of target IPs
nomisec
SUSPICIOUS
5 stars
by exploitblizzard · poc
https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675
The repository contains only a README with a YouTube link and no actual exploit code or technical details. This is indicative of a social engineering lure rather than a legitimate PoC.
Classification
Suspicious 90%
Target:
Windows Print Spooler
No auth needed
nomisec
WORKING POC
3 stars
by hahaleyile · remote
https://github.com/hahaleyile/my-CVE-2021-1675
This repository contains a functional exploit for CVE-2021-1675 (PrintNightmare), leveraging the Windows Print Spooler service to achieve remote code execution via DLL injection. The exploit uses Impacket for RPC communication and supports both SMB and TCP/IP protocols.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid domain credentials · Network access to target · SMB/TCP connectivity
nomisec
WORKING POC
3 stars
by thomasgeens · poc
https://github.com/thomasgeens/CVE-2021-1675
This repository contains a functional PowerShell script that exploits CVE-2021-1675 (PrintNightmare) to achieve local privilege escalation by adding a new local administrator user or executing a custom DLL as NT AUTHORITY\SYSTEM. The exploit leverages the Windows Print Spooler service to load a malicious driver.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Print Spooler service running
nomisec
SUSPICIOUS
2 stars
by ozergoker · poc
https://github.com/ozergoker/PrintNightmare
The repository lacks actual exploit code and only provides mitigation steps for disabling the Print Spooler service. It references CVE-2021-1675 but does not include technical details or functional exploit code.
Classification
Suspicious 90%
Target:
Windows Print Spooler Service
No auth needed
nomisec
WORKING POC
2 stars
by killtr0 · poc
https://github.com/killtr0/CVE-2021-1675-PrintNightmare
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which allows local privilege escalation by abusing the Windows Print Spooler service to load a malicious DLL and create a new local administrator account.
Classification
Working Poc 95%
Target:
Windows Print Spooler (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Ability to execute PowerShell scripts
nomisec
WORKING POC
2 stars
by kondah · poc
https://github.com/kondah/patch-cve-2021-1675
This PowerShell script applies a mitigation for CVE-2021-1675 by denying the 'System' account modify permissions on the Windows Print Spooler directory, preventing exploitation of the PrintNightmare vulnerability.
Classification
Working Poc 90%
Target:
Windows Print Spooler (CVE-2021-1675)
Auth required
Prerequisites:
Administrative privileges to modify directory permissions
nomisec
SUSPICIOUS
2 stars
by yu2u · poc
https://github.com/yu2u/CVE-2021-1675
The repository contains no exploit code, only a vague README with a placeholder message in Chinese ('漏洞利用马上上传' translates to 'Exploit will be uploaded soon'). No technical details or functional code are provided.
Classification
Suspicious 90%
Target:
unknown
No auth needed
nomisec
WORKING POC
1 stars
by DLL00P · remote-auth
https://github.com/DLL00P/CVE-2021-1675
This repository contains a functional exploit for CVE-2021-1675 (PrintNightmare), leveraging the MS-RPRN protocol to achieve remote code execution by manipulating printer driver installation paths. The exploit uses Impacket for RPC communication and demonstrates the vulnerability by copying a malicious DLL to a target system.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Network access to the target · Valid credentials or NTLM hashes · SMB access to a share hosting the malicious DLL
nomisec
WORKING POC
1 stars
by whoami-chmod777 · local
https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527
This repository contains a functional PowerShell script that exploits CVE-2021-1675 (PrintNightmare) to achieve local privilege escalation by adding a new local administrator user or executing a custom DLL as NT AUTHORITY\SYSTEM. The exploit leverages the Windows Print Spooler service to load a malicious driver.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Local access to the target system · Ability to execute PowerShell scripts
nomisec
WORKING POC
1 stars
by puckiestyle · remote
https://github.com/puckiestyle/CVE-2021-1675
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which allows local privilege escalation by adding a new local administrator user via a malicious printer driver. The exploit includes a custom DLL payload and leverages the Windows Print Spooler service to execute arbitrary code as NT AUTHORITY\SYSTEM.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Ability to execute PowerShell scripts
nomisec
WORKING POC
1 stars
by OppressionBreedsResistance · local
https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare
This repository contains a functional exploit for CVE-2021-1675 (PrintNightmare), including a DLL payload and PowerShell scripts to trigger the vulnerability. The exploit leverages the Windows Print Spooler service to execute arbitrary code with SYSTEM privileges.
Classification
Working Poc 95%
Target:
Windows Print Spooler service (multiple versions)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · Print Spooler service running
nomisec
WORKING POC
1 stars
by Winter3un · poc
https://github.com/Winter3un/CVE-2021-1675
This repository provides a modified version of the PrintNightmare exploit (CVE-2021-1675) to support remote execution. It requires uploading specific files to a remote server and setting up port forwarding for exploitation.
Classification
Working Poc 80%
Target:
Windows Print Spooler
No auth needed
Prerequisites:
Access to upload files to a remote server · Port forwarding setup
nomisec
WRITEUP
1 stars
by kougyokugentou · poc
https://github.com/kougyokugentou/CVE-2021-1675
This repository provides a PowerShell script using Desired State Configuration (DSC) to mitigate CVE-2021-1675 (PrintNightmare) by disabling the Print Spooler service across multiple servers in specified Active Directory OUs. It includes a detailed README explaining the vulnerability and mitigation steps.
Classification
Writeup 90%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Active Directory access · PowerShell with ActiveDirectory module · Administrative privileges
nomisec
WORKING POC
by ccordeiro · remote-auth
https://github.com/ccordeiro/CVE-2021-1675
This repository contains a functional Python exploit for CVE-2021-1675 (PrintNightmare), which leverages the Windows Print Spooler service to achieve remote code execution via a crafted driver installation. The exploit uses Impacket for RPC communication and demonstrates the vulnerability by copying a malicious DLL to a target system.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid credentials or hashes for authentication · Network access to the target's SMB/RPC services
nomisec
SUSPICIOUS
by VoiidByte · poc
https://github.com/VoiidByte/Impacket
The repository contains no exploit code or technical details related to CVE-2021-1675. Instead, it appears to be a legitimate Swift library for displaying GIFs in a HUD, unrelated to the CVE.
Classification
Suspicious 95%
Target:
N/A
No auth needed
nomisec
STUB
by GlacierGossip · poc
https://github.com/GlacierGossip/PrintNightmare
The repository is unrelated to CVE-2021-1675 (PrintNightmare) and instead contains Django registration templates. No exploit code or technical details about the vulnerability are present.
Target:
N/A
No auth needed
nomisec
WORKING POC
by 0xSs0rZ · local
https://github.com/0xSs0rZ/Windows_Exploit
This PowerShell script exploits CVE-2021-1675 (PrintNightmare) to add a new local administrator user or execute a custom DLL with SYSTEM privileges. It leverages the Windows Print Spooler service to load a malicious driver, achieving local privilege escalation.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Print Spooler service running
nomisec
WORKING POC
by thalpius · local
https://github.com/thalpius/Microsoft-CVE-2021-1675
This repository contains a functional C# exploit for CVE-2021-1675, a Windows Print Spooler elevation of privilege vulnerability. The exploit leverages the AddPrinterDriverEx API to load arbitrary DLLs, demonstrating the vulnerability's potential for local privilege escalation.
Classification
Working Poc 95%
Target:
Microsoft Windows Print Spooler
Auth required
Prerequisites:
Local access to the target system · Valid driver and DLL paths
nomisec
WORKING POC
by whoami-chmod777 · local
https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which leverages a vulnerability in the Windows Print Spooler service to achieve local privilege escalation (LPE) by loading a malicious DLL. The exploit includes a custom DLL payload that creates a new local administrator user with a specified password.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Ability to execute PowerShell scripts
nomisec
SUSPICIOUS
by peckre · poc
https://github.com/peckre/PNCVE-Win10-20H2-Exploit
The repository provides a one-liner to download and execute an external ZIP file, which is a common tactic for distributing malware or fake exploits. No actual exploit code or technical details about CVE-2021-1675 are included in the repository.
Classification
Suspicious 90%
Target:
Windows 10 20H2 Print Spooler
No auth needed
Prerequisites:
Internet access to download external ZIP file
nomisec
WRITEUP
by r1skkam · poc
https://github.com/r1skkam/PrintNightmare
This repository provides a detailed technical analysis of the PrintNightmare vulnerability (CVE-2021-1675 and CVE-2021-34527), focusing on detection via Windows Event Logs. It includes specific event logs and error codes related to the exploitation of the Print Spooler service.
Classification
Writeup 90%
Target:
Windows Print Spooler Service
No auth needed
Prerequisites:
Access to the target system's Print Spooler service · Ability to write to the spooler directory
nomisec
WORKING POC
by edsonjt81 · remote-auth
https://github.com/edsonjt81/CVE-2021-1675
This repository contains a functional Python exploit for CVE-2021-1675 (PrintNightmare), which leverages the Windows Print Spooler service to achieve remote code execution by uploading a malicious DLL. The exploit uses Impacket for RPC communication and demonstrates the vulnerability by abusing the `RpcAddPrinterDriverEx` function.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Valid domain credentials or local admin access · Network access to the target's SMB and RPC services · A writable SMB share hosting the malicious DLL
nomisec
WORKING POC
by 000Tonio · poc
https://github.com/000Tonio/cve-2021-1675
This PowerShell script exploits CVE-2021-1675 (PrintNightmare) to achieve local privilege escalation by adding a new local administrator user via a malicious printer driver. It includes a built-in DLL payload and supports custom DLL execution.
Classification
Working Poc 95%
Target:
Windows Print Spooler (spoolsv.exe)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · Print Spooler service running
nomisec
WORKING POC
by zha0 · poc
https://github.com/zha0/Microsoft-CVE-2021-1675
This repository contains a functional C# exploit for CVE-2021-1675, a Windows Print Spooler elevation of privilege vulnerability. The exploit leverages the AddPrinterDriverEx API to load arbitrary DLLs, demonstrating the vulnerability's potential for local privilege escalation.
Classification
Working Poc 95%
Target:
Microsoft Windows Print Spooler
Auth required
Prerequisites:
Local access to the target system · Ability to execute code on the target system
nomisec
WORKING POC
by galoget · remote
https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527
This repository contains a functional exploit for CVE-2021-1675 (PrintNightmare), leveraging the Windows Print Spooler service to achieve remote code execution via a malicious DLL. The exploit uses the MS-RPRN protocol to manipulate printer driver configurations and execute arbitrary code.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid credentials or NTLM hashes · Network access to the target's SMB service
nomisec
STUB
by initconf · poc
https://github.com/initconf/cve-2021-1675-printnightmare
The repository contains only a minimal Makefile with a placeholder test target, lacking any functional exploit code or technical details related to CVE-2021-1675. It appears to be an incomplete or placeholder project.
Target:
Windows Print Spooler
No auth needed
nomisec
WRITEUP
by ptter23 · poc
https://github.com/ptter23/CVE-2021-1675
This repository provides a mitigation script for CVE-2021-1675, a zero-day vulnerability in the Windows Print Spooler service. It includes a PowerShell script to disable the Spooler service across multiple servers as a temporary workaround.
Classification
Writeup 80%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Administrative access to target servers · List of servers in a text file
nomisec
WRITEUP
by mrezqi · poc
https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery
This repository provides CarbonBlack hunting queries for detecting exploitation attempts of CVE-2021-1675 (PrintNightmare). It includes Sigma-based rules to identify suspicious file modifications, module loads, and process behaviors associated with the vulnerability.
Classification
Writeup 90%
Target:
Windows Print Spooler
No auth needed
Prerequisites:
Access to CarbonBlack EDR · Knowledge of baseline system behavior
nomisec
WORKING POC
by tanarchytan · poc
https://github.com/tanarchytan/CVE-2021-1675
This repository contains a PowerShell script that mitigates CVE-2021-1675 by removing members from the 'Pre-Windows 2000 Compatible Access' group, which is a known attack vector for this vulnerability. The script checks for the presence of relevant Microsoft hotfixes before applying the mitigation.
Classification
Working Poc 90%
Target:
Windows Print Spooler
Auth required
Prerequisites:
Administrative access to the domain · PowerShell execution policy allowing script execution
metasploit
WORKING POC
by Zhiniang Peng, Xuefeng Li, Zhipeng Huo, Piotr Madej, Zhang Yunhai, cube0x0, Spencer McIntyre, Christophe De La Fuente · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/dcerpc/cve_2021_1675_printnightmare.rb
This Metasploit module exploits CVE-2021-1675 (PrintNightmare) by abusing the Print Spooler service to load a malicious DLL via a crafted DCERPC request, leading to remote code execution as NT AUTHORITY\SYSTEM. It uses the MS-RPRN vector and requires the Print Spooler service to be running.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Authenticated SMB access · Print Spooler service running
patchapalooza
WORKING POC
by digipenguin · remote
https://gitlab.com/digipenguin/CVE-2021-1675
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which leverages a vulnerability in the Windows Print Spooler service to achieve local privilege escalation (LPE) by loading a malicious DLL as NT AUTHORITY\SYSTEM. The exploit includes a custom DLL payload that creates a new local administrator user with a specified password.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Windows Print Spooler service running
patchapalooza
WORKING POC
by trfpatriotic · poc
https://gitee.com/trfpatriotic/CVE-2021-1675
This repository contains functional exploit code for CVE-2021-1675 (PrintNightmare), including both Python and C# implementations. The exploit leverages the Windows Print Spooler service to achieve remote code execution (RCE) or local privilege escalation (LPE) by loading a malicious DLL.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Access to a vulnerable Windows system with Print Spooler enabled · Valid credentials or NTLM hashes for authentication · SMB share hosting the malicious DLL
patchapalooza
WORKING POC
by auduongxuan · remote
https://github.com/auduongxuan/CVE-2022-26809
This repository contains a functional Python exploit for CVE-2021-1675 (PrintNightmare), which leverages the MS-RPRN protocol to achieve remote code execution by manipulating printer driver installation. The exploit uses Impacket for RPC communication and includes logic to enumerate and exploit vulnerable driver paths.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid credentials or NTLM hashes · Network access to the target's SMB/RPC services · A writable SMB share hosting the malicious DLL
patchapalooza
WORKING POC
by TheJoyOfHacking · local
https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which leverages a vulnerability in the Windows Print Spooler service to achieve local privilege escalation (LPE) by loading a malicious DLL. The exploit includes a custom DLL payload that creates a new local administrator user with a specified password.
Classification
Working Poc 95%
Target:
Windows Print Spooler service (multiple versions)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Ability to execute PowerShell scripts
patchapalooza
WORKING POC
by TheJoyOfHacking · remote-auth
https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675
This repository contains a functional Python exploit for CVE-2021-1675 (PrintNightmare), which leverages the Windows Print Spooler service to achieve remote code execution via a malicious DLL. The exploit uses the MS-RPRN protocol to manipulate printer driver configurations and trigger arbitrary file writes.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Valid domain credentials or NTLM hashes · Network access to the target's SMB/RPC services · A share hosting the malicious DLL
patchapalooza
WORKING POC
by AndrewTrube · local
https://github.com/AndrewTrube/CVE-2021-1675
This repository contains a functional exploit for CVE-2021-1675, leveraging the Print Spooler service to bypass SeLoadDriverPrivilege checks and achieve local privilege escalation by installing a malicious DLL. The exploit includes source code for both the main executable and the payload DLL, with clear compilation and execution instructions.
Classification
Working Poc 100%
Target:
Microsoft Windows Print Spooler Service (versions before June 8th, 2021)
No auth needed
Prerequisites:
Access to a vulnerable Windows system · Ability to compile the exploit code · Ability to upload and execute the compiled binary on the target
patchapalooza
WORKING POC
by Cyberfury101 · local
https://gitlab.com/Cyberfury101/CVE-2021-1675
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which leverages a vulnerability in the Windows Print Spooler service to achieve local privilege escalation (LPE) by loading a malicious DLL as NT AUTHORITY\SYSTEM. The exploit includes a custom DLL payload that adds a new local administrator user with a specified password.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Windows Print Spooler service running
patchapalooza
WORKING POC
by slip2008 · poc
https://gitee.com/slip2008/CVE-2021-1675
This repository contains a functional exploit for CVE-2021-1675 (PrintNightmare), leveraging Impacket to execute malicious DLLs remotely or locally via the Print Spooler service. The exploit uses the MS-RPRN protocol to add a printer driver, leading to remote code execution.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid credentials or NTLM hashes · Access to SMB/TCP 445 · Shared DLL accessible via SMB
patchapalooza
WORKING POC
by stemmm · poc
https://gitee.com/stemmm/CVE-2021-1675
This repository contains functional exploit code for CVE-2021-1675 (PrintNightmare), including both Python and C# implementations. The exploit leverages the Windows Print Spooler service to achieve remote code execution (RCE) or local privilege escalation (LPE) by loading a malicious DLL.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Access to a vulnerable Windows system with Print Spooler service enabled · Valid credentials or NTLM hashes for authentication · SMB share hosting the malicious DLL
patchapalooza
WORKING POC
by stemmm · poc
https://gitee.com/stemmm/CVE-2021-1675-LPE
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2021-1675 (PrintNightmare), leveraging the Windows Print Spooler service to load a malicious DLL. The exploit automates the discovery of the target DLL path and uses AddPrinterDriverExW to achieve privilege escalation.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (Windows Server 2019 Standard)
No auth needed
Prerequisites:
Windows system with vulnerable Print Spooler service · Ability to execute the exploit binary
patchapalooza
WORKING POC
by andreamariadb · remote
https://gitlab.com/andreamariadb/CVE-2021-1675
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which leverages a vulnerability in the Windows Print Spooler service to achieve local privilege escalation (LPE) by loading a malicious DLL. The exploit includes a custom DLL payload that adds a new local administrator user with a specified password.
Classification
Working Poc 100%
Target:
Windows Print Spooler service (spoolsv.exe)
No auth needed
Prerequisites:
Local access to a vulnerable Windows system · Windows Print Spooler service running
patchapalooza
WORKING POC
by mirrors_trending · poc
https://gitee.com/mirrors_trending/CVE-2021-1675_1
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which leverages the Windows Print Spooler service to achieve local privilege escalation (LPE). The exploit dynamically generates or accepts a custom DLL payload, uses reflective API calls to interact with the Print Spooler, and adds a new user to the local administrators group by default.
Classification
Working Poc 95%
Target:
Windows Print Spooler (Windows Server 2016, Windows Server 2019)
No auth needed
Prerequisites:
Windows system with vulnerable Print Spooler service · Local user access
patchapalooza
WORKING POC
by BeetleChunks · remote
https://github.com/BeetleChunks/SpoolSploit
This repository contains a functional exploit for CVE-2021-1675 (PrintNightmare), which allows remote code execution (RCE) on Windows systems via the Print Spooler service. It includes a Dockerized environment with tools like Impacket and Responder to facilitate exploitation, including credential relaying and malicious DLL execution.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
valid domain credentials · SMB access to target · DLL hosted on accessible share
patchapalooza
WORKING POC
by mirrors_trending · poc
https://gitee.com/mirrors_trending/CVE-2021-1675
This repository contains functional exploit code for CVE-2021-1675 (PrintNightmare), including both Python and C# implementations. The exploit leverages the Windows Print Spooler service to achieve remote code execution (RCE) or local privilege escalation (LPE) by loading a malicious DLL.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Access to a vulnerable Windows system with Print Spooler service enabled · Valid credentials or NTLM hashes for authentication · SMB share hosting the malicious DLL
patchapalooza
WORKING POC
by evaltx · poc
https://gitee.com/evaltx/CVE-2021-1675
This repository contains functional exploit code for CVE-2021-1675 (PrintNightmare), including both a Python-based remote code execution (RCE) tool using Impacket and a C# local privilege escalation (LPE) implementation. The exploits leverage the Windows Print Spooler service to execute arbitrary DLLs.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Access to a vulnerable Windows system with Print Spooler service enabled · Valid credentials or hashes for authentication · SMB share hosting the malicious DLL