From b846ee220b38af283700156a1cd265fe0b4dc721 Mon Sep 17 00:00:00 2001 From: Kevin Beaumont <34346399+GossiTheDog@users.noreply.github.com> Date: Wed, 21 Jul 2021 11:55:13 +0100 Subject: [PATCH] Update README.md --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index 193b45c..bc03bab 100644 --- a/README.md +++ b/README.md @@ -4,6 +4,9 @@ aka SeriousSam, or now CVE-2021–36934. Exploit allowing you to read any regis # What is this? An zero day exploit for HiveNightmare, which allows you to retrieve all registry hives in Windows 10 as a non-administrator user. For example, this includes hashes in SAM, which can be used to execute code as SYSTEM. +# Download +This is the direct download link for most recent version: https://github.com/GossiTheDog/HiveNightmare/raw/master/Release/HiveNightmare.exe + # Authors - Discovered by @jonasLyk. - PoC by @GossiTheDog, powered by Porgs.