Python项目资源记录
exploit代码
- https://github.com/raystyle/CVE-2021-1676 - powershell版exploit
- https://github.com/raystyle/CVE-2021-1675 - python版exploit
- https://github.com/raystyle/PrintNightmare - 原始版exploit
- https://github.com/cube0x0/CVE-2021-1675 - C#版本exploit
- https://github.com/gentilkiwi/mimikatz/commit/c21276072b3f2a47a21e215a46962a17d54b3760 - mimikatz misc::printnightmare little POC
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from fabric import Connection | |
c = Connection(host="192.168.105.2", | |
user="root", | |
connect_kwargs={ | |
"key_filename": "./id_rsa", | |
#"password": "" | |
} | |
) |
jupyter/notebook#1311 https://github.com/openfisca/jupyter/blob/master/config/nginx_configuration/jupyterhub.nginx.conf https://programming.vip/docs/running-jupyter-jupyterhub-jupyterlab-as-a-system-service.html https://janakiev.com/blog/jupyter-systemd/
jupyter lab --generate-config
Writing default config to: /root/.jupyter/jupyter_lab_config.py
c.ServerApp.allow_remote_access = True