nomisec
SCANNER
804 stars
by byt3bl33d3r · poc
https://github.com/byt3bl33d3r/ItWasAllADream
This repository contains a Python-based scanner for CVE-2021-34527 (PrintNightmare) that checks for vulnerability over MS-PAR and MS-RPRN protocols without exploiting the hosts. It generates a CSV report with results.
Classification
Scanner 100%
Target:
Microsoft Windows Print Spooler
Auth required
Prerequisites:
Authenticated Active Directory credentials · Network access to target systems
nomisec
WORKING POC
304 stars
by JohnHammond · local
https://github.com/JohnHammond/CVE-2021-34527
This repository contains a functional PowerShell script that exploits CVE-2021-34527 (PrintNightmare) to achieve local privilege escalation by adding a new local administrator user or executing a custom DLL as NT AUTHORITY\SYSTEM. The exploit leverages the Windows Print Spooler service to load a malicious driver.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Print Spooler service running
nomisec
WORKING POC
165 stars
by nemo-wq · remote-auth
https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
This repository contains a functional exploit for CVE-2021-34527 (PrintNightmare), which leverages the Windows Print Spooler service to achieve remote code execution (RCE) via crafted RPC calls to add a malicious printer driver. The exploit includes Python and C++ implementations, demonstrating the vulnerability by copying a DLL to a remote system and executing it.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Network access to the target system · Valid credentials for authentication · SMB access to a share hosting the malicious DLL
nomisec
WORKING POC
119 stars
by m8sec · remote
https://github.com/m8sec/CVE-2021-34527
This repository contains a functional Python exploit for CVE-2021-34527, leveraging the Print Spooler service to achieve remote code execution via a crafted driver installation. The exploit includes an SMB server for staging payloads and uses DCERPC for communication with the target.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid credentials for the target system · Network access to the target's SMB and RPC services
nomisec
WORKING POC
22 stars
by hackerhouse-opensource · local
https://github.com/hackerhouse-opensource/cve-2021-34527
This repository contains a functional exploit for CVE-2021-34527, leveraging the AddPrinterDriverEx() API to escalate privileges to SYSTEM by loading a malicious DLL into spoolsv.exe. The exploit includes cleanup mechanisms and is designed for Windows Desktop and Server versions.
Classification
Working Poc 100%
Target:
Windows Desktop 7,8,8.1,10,11 & Server 2008,2012,2016,2019
Auth required
Prerequisites:
A valid path to a thread-safe DLL · Weakened Point & Print policy or administrative privileges
nomisec
SUSPICIOUS
5 stars
by CnOxx1 · poc
https://github.com/CnOxx1/CVE-2021-34527-1675
The repository contains only a vague README with no technical details or exploit code, instead using buzzwords and referencing external CVEs without providing any substantive analysis or PoC.
Classification
Suspicious 90%
Target:
Windows Print Spooler
No auth needed
nomisec
WRITEUP
3 stars
by Tomparte · poc
https://github.com/Tomparte/PrintNightmare
This repository provides a PowerShell script and documentation for mitigating the PrintNightmare vulnerability (CVE-2021-34527) by applying registry modifications and service configurations. It does not contain exploit code but offers technical guidance on remediation.
Classification
Writeup 90%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Administrative access to modify registry and services
nomisec
WORKING POC
3 stars
by dywhoami · infoleak
https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC
This repository contains a functional exploit for CVE-2021-34527, a vulnerability in the Windows Print Spooler service. The exploit leverages the RpcAddPrinterDriverEx function to achieve remote code execution by manipulating printer driver configurations.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid domain credentials · Network access to the target machine
nomisec
SCANNER
2 stars
by 0xirison · poc
https://github.com/0xirison/PrintNightmare-Patcher
This repository contains a Python script that scans for the PrintNightmare vulnerability (CVE-2021-34527) by checking for the presence of security updates, registry settings, and the status of the Print Spooler service. It also attempts to mitigate the vulnerability by disabling the service and updating registry keys.
Classification
Scanner 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Administrative privileges on the target Windows system
nomisec
WORKING POC
2 stars
by thomas-lauer · poc
https://github.com/thomas-lauer/PrintNightmare
This repository contains PowerShell scripts to exploit CVE-2021-34527 (PrintNightmare) by modifying ACLs on the Windows Print Spooler directory to grant or deny SYSTEM access, enabling privilege escalation or lateral movement. The scripts include functionality to backup, restore, and manipulate permissions on the spooler directory.
Classification
Working Poc 90%
Target:
Windows Print Spooler (CVE-2021-34527)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · PowerShell execution privileges
nomisec
WRITEUP
2 stars
by rdboboia · poc
https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint
This repository provides a workaround for CVE-2021-34527 (Windows Print Spooler RCE) by disabling the RegisterSpoolerRemoteRpcEndPoint registry entry. It includes detailed instructions for manual mitigation via Group Policy Editor.
Classification
Writeup 90%
Target:
Windows Print Spooler
Auth required
Prerequisites:
Administrative privileges on the target system
nomisec
SCANNER
2 stars
by powershellpr0mpt · poc
https://github.com/powershellpr0mpt/PrintNightmare-CVE-2021-34527
The repository contains PowerShell scripts for detecting and remediating registry settings related to CVE-2021-34527 (PrintNightmare). It does not include exploit code but provides detection and mitigation tools.
Classification
Scanner 90%
Target:
Windows Print Spooler
Auth required
Prerequisites:
Administrative access to modify registry settings
nomisec
WORKING POC
1 stars
by cyb3rpeace · local
https://github.com/cyb3rpeace/CVE-2021-34527
This repository contains a functional PowerShell script that exploits CVE-2021-34527 (PrintNightmare) to achieve local privilege escalation by adding a new local administrator user or executing a custom DLL as NT AUTHORITY\SYSTEM. The exploit leverages the Windows Print Spooler service to load a malicious DLL.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Print Spooler service running
nomisec
WORKING POC
1 stars
by Amaranese · poc
https://github.com/Amaranese/CVE-2021-34527
This repository contains a functional PowerShell exploit for CVE-2021-34527 (PrintNightmare), which leverages a vulnerability in the Windows Print Spooler service to achieve local privilege escalation (LPE) by loading a malicious DLL. The exploit includes a custom DLL payload that creates a new local administrator user with a specified password.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (spoolsv.exe)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Windows Print Spooler service running
gitlab
SUSPICIOUS
by pgregoire-ci · poc
https://gitlab.com/pgregoire-ci/CVE-2021-34527
This repository does not contain actual exploit code but instead provides a GitLab CI pipeline to build an external exploit (SharpPrintNightmare) and directs users to download the binary from an external source. The README lacks technical details about CVE-2021-34527 and serves as a redirect to another repository.
Classification
Suspicious 90%
Target:
Windows Print Spooler
No auth needed
Prerequisites:
access to GitLab CI artifacts
nomisec
WORKING POC
by AUSK1LL9 · poc
https://github.com/AUSK1LL9/CVE-2021-34527
This repository contains a functional PowerShell script that exploits CVE-2021-34527 (PrintNightmare) to achieve local privilege escalation by adding a new local administrator user or executing a custom DLL as NT AUTHORITY\SYSTEM. The exploit leverages the Windows Print Spooler service to load a malicious driver.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (multiple versions)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · Print Spooler service running
nomisec
SCANNER
by TieuLong21Prosper · poc
https://github.com/TieuLong21Prosper/detect_bruteforce
This repository contains a Python script that detects brute-force attacks by monitoring network traffic for repeated login attempts (e.g., FTP USER/PASS commands) using Scapy. It logs packets to PCAP and CSV files but does not exploit CVE-2021-34527.
Classification
Scanner 90%
Target:
Network services (FTP)
No auth needed
Prerequisites:
Network access to monitor traffic · Scapy library
nomisec
WORKING POC
by d0rb · poc
https://github.com/d0rb/CVE-2021-34527
This repository contains a functional Python script that sends a crafted SMB payload to exploit CVE-2021-34527 (PrintNightmare). The payload is designed to trigger the vulnerability via SMB port 445.
Classification
Working Poc 90%
Target:
Windows Print Spooler
No auth needed
Prerequisites:
Network access to target's SMB port (445) · Vulnerable Windows Print Spooler service
nomisec
WRITEUP
by syntaxbearror · poc
https://github.com/syntaxbearror/PowerShell-PrintNightmare
This repository provides PowerShell scripts to mitigate CVE-2021-34527 (PrintNightmare) by setting registry keys to restrict printer driver installation and block remote printing. It includes technical details on registry modifications and references external blogs for deeper analysis.
Classification
Writeup 90%
Target:
Windows Print Spooler
Auth required
Prerequisites:
Administrative access to modify registry keys
nomisec
WORKING POC
by Eutectico · poc
https://github.com/Eutectico/Printnightmare
This repository contains PowerShell scripts to mitigate CVE-2021-34527 (PrintNightmare) by disabling the Print Spooler service and modifying ACLs to prevent driver installation. The scripts are functional and directly address the vulnerability by blocking exploit paths.
Classification
Working Poc 90%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Administrator privileges · Access to the target system
nomisec
WRITEUP
by WidespreadPandemic · poc
https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation
This repository provides PowerShell scripts to mitigate CVE-2021-34527 (PrintNightmare) by modifying ACLs to deny write permissions to the printer drivers directory. It includes scripts to apply and rollback the mitigation, along with a detailed explanation of its effectiveness.
Classification
Writeup 90%
Target:
Windows Print Spooler
Auth required
Prerequisites:
Access to modify ACLs on the target system
nomisec
STUB
by glorisonlai · poc
https://github.com/glorisonlai/printnightmare
The repository contains only a minimal README with a CVE reference and no functional exploit code or technical details. It appears to be a placeholder without substantive content.
Target:
Windows Print Spooler
No auth needed
nomisec
WORKING POC
by geekbrett · poc
https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround
This PowerShell script mitigates CVE-2021-34527 (PrintNightmare) by disabling the Print Spooler service and blocking remote RPC endpoints. It provides options to temporarily or permanently re-enable the service for printing tasks.
Classification
Working Poc 90%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Administrator privileges
nomisec
STUB
by vinaysudheer · poc
https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527
This repository contains a simple batch script to disable the Microsoft Print Spooler service as a mitigation for CVE-2021-34527 (PrintNightmare). It does not include an exploit PoC or technical analysis of the vulnerability.
Target:
Microsoft Windows Print Spooler
Auth required
Prerequisites:
Administrative privileges on the target system
nomisec
SCANNER
by DenizSe · poc
https://github.com/DenizSe/CVE-2021-34527
The repository contains PowerShell scripts that scan for the state of the Print Spooler service across domain controllers in an Active Directory environment. It does not exploit CVE-2021-34527 but checks for the service status, which could be used to identify vulnerable systems.
Classification
Scanner 90%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Access to Active Directory environment · Permissions to query domain controllers
metasploit
WORKING POC
by Zhiniang Peng, Xuefeng Li, Zhipeng Huo, Piotr Madej, Zhang Yunhai, cube0x0, Spencer McIntyre, Christophe De La Fuente · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/dcerpc/cve_2021_1675_printnightmare.rb
This Metasploit module exploits CVE-2021-34527 (PrintNightmare) by abusing the Print Spooler service to load a malicious DLL via a crafted DCERPC request, achieving remote code execution as NT AUTHORITY\SYSTEM.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Authenticated SMB access · Print Spooler service running
patchapalooza
WORKING POC
by whoami-chmod777 · local
https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527
This repository contains a functional PowerShell exploit for CVE-2021-1675 (PrintNightmare), which allows local privilege escalation by adding a new local administrator user via a malicious printer driver. The exploit includes a custom DLL payload and leverages the Windows Print Spooler service to execute arbitrary code as NT AUTHORITY\SYSTEM.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service (CVE-2021-1675)
Auth required
Prerequisites:
Local access to a vulnerable Windows system · PowerShell execution privileges
patchapalooza
WORKING POC
by d0nkeyk0ng787 · remote
https://github.com/d0nkeyk0ng787/PrintNightmare-POC
This repository contains a functional exploit for CVE-2021-34527 (PrintNightmare), which leverages the Windows Print Spooler service to achieve remote code execution by loading a malicious DLL. The exploit uses the AddPrinterDriverExW API to trigger the vulnerability and requires a SMB server to host the payload.
Classification
Working Poc 95%
Target:
Microsoft Windows Print Spooler service (affected versions include Windows 10 1809 and others)
No auth needed
Prerequisites:
A malicious DLL generated via msfvenom · SMB server to host the DLL · Metasploit listener for reverse shell · Correct driver path on the target system
patchapalooza
WORKING POC
by ly4k · remote-auth
https://github.com/ly4k/PrintNightmare
This repository contains a functional Python exploit for CVE-2021-34527 (PrintNightmare), leveraging Impacket to achieve remote code execution via the Windows Print Spooler service. The exploit supports multiple modes, including DLL injection, vulnerability checking, and driver enumeration.
Classification
Working Poc 100%
Target:
Windows Print Spooler Service (multiple versions)
Auth required
Prerequisites:
valid credentials or Kerberos authentication · network access to the target's SMB and RPRN services
patchapalooza
WORKING POC
by cube0x0 · remote-auth
https://github.com/cube0x0/CVE-2021-1675
This repository contains a functional Python exploit for CVE-2021-34527 (PrintNightmare), which leverages the Windows Print Spooler service to achieve remote code execution via a malicious DLL. The exploit uses the MS-RPRN protocol to manipulate printer driver configurations and execute arbitrary code.
Classification
Working Poc 95%
Target:
Windows Print Spooler Service
Auth required
Prerequisites:
Valid credentials or NTLM hashes · Network access to the target's SMB service · A share hosting the malicious DLL