This is an adaptation of the original CVE-2021-1675 / CVE-2021-34527 python code from Cube0x0 (https://github.com/cube0x0/CVE-2021-1675) and the code that was Benjamin Deply incorporated into Mimikatz (https://github.com/gentilkiwi/mimikatz/). Some of the PAR functionality was incorporated from byt3bl33d3r's ItWasAllADream (https://github.com/byt3bl33d3r/ItWasAllADream).
It allows for both MS-PAR and MS-RPRN.
- cube0x0 for implementing the MS-PAR & MS-RPRN protocols in Impacket and creating the PrintNightmare Python Exploits
- Zhiniang Peng & Xuefeng Li for the discovery of the PrintNightmare exploit.
- byt3bl33d3r for the PAR related code.
- Benjamin Deply for the C implementation for Printnightmare for Mimikatz.