CVE-2021-34527 PrintNightmare PoC# CVE-2021-34527 PrintNightmare PoC 👾
## 📝 Description
This simple Python script allows you to send a payload to a target IP address and port using the SMB protocol. It's designed to demonstrate the use of an SMB exploit payload for educational purposes. The payload is a hard-coded SMB message containing a specific sequence of bytes.
##
## ⚠️ Important Notes
Use responsibly: This script is intended for educational purposes only. Do not use it for unauthorized or malicious activities.
Payload: The payload included in the script is a sample and may not work against all targets or scenarios.
Legal implications: Unauthorized scanning, testing, or exploiting of systems is illegal and unethical. Ensure you have proper authorization before using this script.
##
## 📜 License
This project is licensed under the MIT License.
[4.0K] /data/pocs/a2d54c3b82e8cc9611e620b0d9d7de6317fbde68
├── [4.1K] PoC.py
└── [ 840] README.md
0 directories, 2 files