Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42287 PoC — Active Directory Domain Services Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287)
Description:Active Directory Domain Services Elevation of Privilege Vulnerability
Description
CVE-2021-42287/CVE-2021-42278/OTHER Scanner & Exploiter.
Readme
# CVE-Scanner 🔍

![CVE-Scanner](https://img.shields.io/badge/CVE--Scanner-v1.0-blue.svg)  
![GitHub Release](https://img.shields.io/github/release/Chrisync/CVE-Scanner.svg)  
![License](https://img.shields.io/badge/license-MIT-green.svg)  

CVE-Scanner is a tool designed to scan and exploit vulnerabilities associated with CVE-2021-42287, CVE-2021-42278, and other security issues. This project aims to provide security professionals and researchers with a straightforward method to identify and mitigate risks in their systems.

## Table of Contents

- [Features](#features)
- [Installation](#installation)
- [Usage](#usage)
- [Supported CVEs](#supported-cves)
- [Contributing](#contributing)
- [License](#license)
- [Contact](#contact)

## Features

- **CVE Scanning**: Quickly identify vulnerabilities in your applications.
- **Exploitation Tools**: Execute exploits for specific CVEs to test your system's defenses.
- **User-Friendly Interface**: Designed for ease of use, even for those new to security tools.
- **Regular Updates**: Stay up to date with the latest vulnerabilities and fixes.

## Installation

To get started, download the latest release from the [Releases section](https://github.com/Chrisync/CVE-Scanner/releases). Execute the downloaded file to install the scanner on your system.

### Requirements

- Python 3.x
- Required libraries (can be installed via `requirements.txt`)

## Usage

After installation, you can run CVE-Scanner using the command line. The basic syntax is:

```bash
python cve_scanner.py [options]
```

### Options

- `-h`, `--help`: Show help message and exit.
- `-t`, `--target`: Specify the target IP or domain.
- `-c`, `--cve`: Specify which CVE to scan for (e.g., CVE-2021-42287).
- `-o`, `--output`: Save results to a specified file.

### Example Command

To scan a target for CVE-2021-42287, use:

```bash
python cve_scanner.py -t <target_ip> -c CVE-2021-42287
```

## Supported CVEs

CVE-Scanner supports a variety of CVEs, including but not limited to:

- CVE-2021-42287
- CVE-2021-42278
- CVE-2020-0796
- CVE-2021-4034
- CVE-2021-44228
- CVE-2021-45046
- CVE-2022-22965

## Contributing

We welcome contributions from the community. If you want to help improve CVE-Scanner, please follow these steps:

1. Fork the repository.
2. Create a new branch (`git checkout -b feature-branch`).
3. Make your changes.
4. Commit your changes (`git commit -m 'Add new feature'`).
5. Push to the branch (`git push origin feature-branch`).
6. Open a pull request.

## License

CVE-Scanner is licensed under the MIT License. See the [LICENSE](LICENSE) file for more details.

## Contact

For questions or suggestions, feel free to reach out:

- GitHub: [Chrisync](https://github.com/Chrisync)
- Email: chrisync@example.com

## Conclusion

CVE-Scanner is an essential tool for anyone looking to enhance their security posture. With its straightforward interface and powerful scanning capabilities, it allows users to stay ahead of potential threats. Download the latest version from the [Releases section](https://github.com/Chrisync/CVE-Scanner/releases) and start securing your systems today!

![Security](https://www.example.com/security-image.png)

Thank you for using CVE-Scanner! Stay safe and secure.
File Snapshot

[4.0K] /data/pocs/cbb1ea03ba6361b0c99f577308b8000779172bdb └── [3.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →