nomisec
WORKING POC
829 stars
by 0vercl0k · dos
https://github.com/0vercl0k/CVE-2021-31166
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a use-after-free vulnerability in HTTP.sys. The exploit triggers a kernel crash by sending a crafted HTTP request with a malformed 'Accept-Encoding' header, demonstrating the vulnerability in affected Windows versions.
Classification
Working Poc 100%
Target:
Microsoft HTTP Protocol Stack (HTTP.sys) on Windows 10/Server 2004/20H2
No auth needed
Prerequisites:
Network access to the target system · HTTP.sys enabled on the target
nomisec
WORKING POC
19 stars
by ZZ-SOCMAP · poc
https://github.com/ZZ-SOCMAP/CVE-2021-31166
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a remote Use-After-Free (UAF) vulnerability in HTTP.sys. The exploit sends a crafted HTTP request with a malformed 'Accept-Encoding' header to trigger a denial-of-service (DoS) condition, causing the target system to crash and reboot.
Classification
Working Poc 90%
Target:
Microsoft HTTP.sys (Windows HTTP Protocol Stack)
No auth needed
Prerequisites:
Network access to the target system · HTTP.sys exposed and vulnerable
nomisec
SCANNER
13 stars
by corelight · poc
https://github.com/corelight/CVE-2021-31166
This repository provides detection mechanisms (Suricata rule and Zeek package) for CVE-2021-31166, a Windows HTTP Protocol Stack vulnerability, but does not include functional exploit code. It includes example logs and alerts generated by these detection tools.
Classification
Scanner 90%
Target:
Microsoft Windows HTTP Protocol Stack
No auth needed
Prerequisites:
Network access to target system · Ability to send crafted HTTP requests
nomisec
WORKING POC
8 stars
by zha0gongz1 · dos
https://github.com/zha0gongz1/CVE-2021-31166
This repository contains a functional PoC for CVE-2021-31166, a use-after-free vulnerability in HTTP.sys. The exploit sends a crafted HTTP request with a malformed 'Accept-Encoding' header to trigger a crash in vulnerable Windows systems.
Classification
Working Poc 90%
Target:
Microsoft HTTP.sys (Windows 10/Server 2004/20H2)
No auth needed
Prerequisites:
Network access to the target system
nomisec
SCANNER
7 stars
by 0xmaximus · dos
https://github.com/0xmaximus/Home-Demolisher
The repository contains a scanner for CVE-2022-21907, which checks for a DoS vulnerability in IIS servers by sending a malformed 'Accept-Encoding' header. The script verifies if the server crashes after sending the payload.
Classification
Scanner 90%
Target:
Microsoft IIS Server
No auth needed
Prerequisites:
Network access to the target IIS server
nomisec
WORKING POC
7 stars
by y0g3sh-99 · dos
https://github.com/y0g3sh-99/CVE-2021-31166-Exploit
The repository contains a functional exploit for CVE-2021-31166, which targets a vulnerability in the Microsoft HTTP Protocol Stack (Http.sys). The exploit sends a crafted 'Accept-Encoding' header to trigger a denial-of-service (DoS) condition, causing a blue screen error and system reboot.
Classification
Working Poc 95%
Target:
Microsoft HTTP Protocol Stack (Http.sys) on Windows 10 and Windows Server 2016 (20h2 and 2004 releases)
No auth needed
Prerequisites:
Network access to the target system · Target system running a vulnerable version of Windows
github
WORKING POC
6 stars
by Y5neKO · pythonpoc
https://github.com/Y5neKO/ExpAndPoc_Collection/tree/main/CVE-2021-31166
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a use-after-free vulnerability in HTTP.sys. The exploit triggers a kernel crash (BSOD) by sending a crafted HTTP request with a malformed 'Accept-Encoding' header.
Classification
Working Poc 95%
Target:
Microsoft HTTP Protocol Stack (http.sys) on Windows 10/Server 2004/20H2
No auth needed
Prerequisites:
Network access to the target system · HTTP.sys enabled on the target
nomisec
WORKING POC
5 stars
by zecopro · dos
https://github.com/zecopro/CVE-2021-31166
The repository contains a functional bash script that exploits CVE-2021-31166, an HTTP request smuggling vulnerability in IIS servers. The script sends a malformed HTTP request with a crafted 'Accept-encoding' header to trigger the vulnerability.
Classification
Working Poc 90%
Target:
Microsoft IIS Server
No auth needed
Prerequisites:
Target URL of an IIS server
nomisec
SCANNER
3 stars
by mvlnetdev · poc
https://github.com/mvlnetdev/CVE-2021-31166-detection-rules
This repository provides detection rules for Suricata, Snort, and Zeek to identify exploitation attempts of CVE-2021-31166, an HTTP Protocol Stack Remote Code Execution vulnerability in Windows. It includes network-based detection logic but does not contain exploit code.
Classification
Scanner 90%
Target:
Windows HTTP Protocol Stack (IIS, WinRM, WSDAPI) on Windows 10/Server 2004/20H2
No auth needed
Prerequisites:
Network access to vulnerable Windows host · Vulnerable HTTP Protocol Stack (IIS, WinRM, or WSDAPI)
nomisec
SUSPICIOUS
2 stars
by iranzai · poc
https://github.com/iranzai/CVE-2021-31166-exploit
The repository contains only a README with a list of affected versions for CVE-2021-31166 but no actual exploit code, technical details, or proof-of-concept. It appears to be a placeholder or lure without substantive content.
Classification
Suspicious 90%
Target:
Microsoft Windows 10 (versions 2004, 20H2) and Windows Server (versions 2004, 20H2)
No auth needed
gitlab
WORKING POC
by securitystuffbackup · poc
https://gitlab.com/securitystuffbackup/CVE-2021-31166
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a use-after-free vulnerability in the HTTP Protocol Stack (http.sys) in Windows. The exploit triggers a kernel crash by sending a crafted HTTP request with a malformed 'Accept-Encoding' header, leading to a LIST_ENTRY corruption and a KERNEL_SECURITY_CHECK_FAILURE bugcheck.
Classification
Working Poc 100%
Target:
Windows HTTP Protocol Stack (http.sys) on Windows 10 Version 2004/20H2 and Windows Server 2004/20H2
No auth needed
Prerequisites:
Network access to the target system · HTTP.sys enabled on the target
gitlab
WORKING POC
by securitystuffbackup · poc
https://gitlab.com/securitystuffbackup/CVE-2021-31166-2
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a use-after-free vulnerability in the HTTP Protocol Stack (http.sys) in Windows. The exploit triggers a kernel crash by sending a crafted HTTP request with a malformed 'Accept-Encoding' header, leading to a LIST_ENTRY corruption and a KERNEL_SECURITY_CHECK_FAILURE bugcheck.
Classification
Working Poc 95%
Target:
Windows HTTP Protocol Stack (http.sys) on Windows 10 Version 2004/20H2 and Windows Server 2004/20H2
No auth needed
Prerequisites:
Network access to the target system · Target system running an affected version of Windows with http.sys exposed
nomisec
WORKING POC
by bgsilvait · poc
https://github.com/bgsilvait/WIn-CVE-2021-31166
This repository provides a functional proof-of-concept for CVE-2021-31166, a use-after-free vulnerability in http.sys. It includes Terraform scripts to deploy a vulnerable Windows Server 20H2 environment and a curl command to trigger the vulnerability via a malformed Accept-Encoding header.
Classification
Working Poc 90%
Target:
Microsoft HTTP Protocol Stack (http.sys) on Windows Server 20H2
No auth needed
Prerequisites:
AWS account with permissions to create EC2 instances and ALB · Terraform installed
patchapalooza
WORKING POC
by liang2kl · dos
https://github.com/liang2kl/iot-exploits
This repository contains functional exploit code for CVE-2021-31166, a Windows HTTP Protocol Stack Remote Code Execution Vulnerability. The exploit includes a Python script (`exp.py`) and supporting files for environment setup, demonstrating the vulnerability in a controlled manner.
Classification
Working Poc 95%
Target:
Windows 10 20H2 HTTP Protocol Stack
No auth needed
Prerequisites:
Windows 10 20H2 target system · Network access to the target
patchapalooza
WORKING POC
by mauricelambert · dos
https://github.com/mauricelambert/CVE-2021-31166
This repository contains functional exploit code for CVE-2021-31166, a DoS vulnerability in Microsoft IIS. The scripts (PowerShell, Ruby, Python) send malformed 'Accept-Encoding' headers to trigger a Blue Screen crash.
Classification
Working Poc 95%
Target:
Microsoft IIS (versions affected by CVE-2021-31166)
No auth needed
Prerequisites:
network access to target IIS server
patchapalooza
WORKING POC
by ckz-code · poc
https://gitee.com/ckz-code/CVE-2021-31166
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a use-after-free vulnerability in the HTTP Protocol Stack (http.sys) in Windows. The exploit triggers a kernel crash by sending a crafted HTTP request with a malformed 'Accept-Encoding' header, leading to a LIST_ENTRY corruption and a KERNEL_SECURITY_CHECK_FAILURE bugcheck.
Classification
Working Poc 100%
Target:
Microsoft Windows HTTP Protocol Stack (http.sys)
No auth needed
Prerequisites:
Network access to the target system · HTTP service (e.g., IIS, WinRM, WSDAPI) running on the target
patchapalooza
WORKING POC
by mirrors_trending · poc
https://gitee.com/mirrors_trending/CVE-2021-31166
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a use-after-free vulnerability in HTTP.sys. The exploit triggers a kernel security check failure by sending a crafted HTTP request with a malformed 'Accept-Encoding' header.
Classification
Working Poc 95%
Target:
Microsoft HTTP Protocol Stack (HTTP.sys) on Windows 10/Server 2004/20H2
No auth needed
Prerequisites:
Network access to the target system · HTTP.sys enabled on the target
patchapalooza
WORKING POC
by ljygit123 · poc
https://gitee.com/ljygit123/CVE-2021-31166
This repository contains a functional proof-of-concept exploit for CVE-2021-31166, a use-after-free vulnerability in Microsoft's HTTP Protocol Stack (http.sys). The exploit triggers a kernel crash by sending a crafted HTTP request with a malformed 'Accept-Encoding' header, leading to a LIST_ENTRY corruption and a KERNEL_SECURITY_CHECK_FAILURE bugcheck.
Classification
Working Poc 100%
Target:
Microsoft HTTP Protocol Stack (http.sys) on Windows
No auth needed
Prerequisites:
Network access to the target system · Target system running a vulnerable version of http.sys