Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-1675 PoC — Windows Print Spooler Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows Print Spooler Remote Code Execution Vulnerability (CVE-2021-1675)
Description:Windows Print Spooler Remote Code Execution Vulnerability
Description
Vulnerability Scanner for CVE-2021-1675/PrintNightmare
Readme
# CVE-2021-1675-SCANNER
Vulnerability Scanner for CVE-2021-1675

follow install instructions for https://github.com/cube0x0/CVE-2021-1675
make sure you have rpcdump.py

from a list of hosts that you gather use nmap tag -oG to output your file with list of hosts that are up

```Example: nmap -iL hosts.txt -T4 --open -p 135 -oG outfile.txt```

```python3 scan.py outfile.txt```

its not the best way to implement this lol but anyways thanks for coming to my ted talk
HACK THE PLANET!
File Snapshot

[4.0K] /data/pocs/2b241f3beddd980f44cbcc1049abff1f76e54177 ├── [ 34K] LICENSE ├── [ 484] README.md └── [ 746] scan.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →