Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527# PrintNightmare

## [Check if your post-Patch machine is still vulnerable](PrivEscTest.md)
Guidance on how to implement a non-malicious, 'defanged' version of the exploit.
## [Research piece that dissects captured network traffic of the PrintNightmare exploit](PrintNightmarePCAPAnalysis.md)
Analysis of a PCAP that contains malicious traffic from PrintNightmare
[4.0K] /data/pocs/7604168dd59e17adccf07bc0e79339e9ad3414f6
├── [167K] attacker_side.pcapng
├── [ 90K] nightmare.dll
├── [ 32K] PrintNightmarePCAPAnalysis.md
├── [3.9K] PrivEscTest.md
└── [ 478] README.md
0 directories, 5 files