☆206Oct 27, 2024Updated last year
Alternatives and similar repositories for lexmark
Users that are interested in lexmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract HP printer ".bdl" firmware update files☆12Nov 15, 2017Updated 8 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- ☆166Feb 29, 2024Updated 2 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- LPE exploit for CVE-2023-21768☆419Mar 8, 2023Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Oct 17, 2025Updated 6 months ago
- Foxit PDF Reader Remote Code Execution Exploit☆120Dec 5, 2023Updated 2 years ago
- ☆153May 26, 2022Updated 3 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- A public collection of POCs & Exploits for the vulnerabilities I discovered☆411Dec 31, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆706Nov 7, 2023Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆110May 12, 2023Updated 2 years ago
- Universal root exploit for the linux kernel☆37Apr 30, 2024Updated last year
- Sniffing files generator☆62Feb 24, 2025Updated last year
- Fileless atexec, no more need for port 445☆405Mar 28, 2024Updated 2 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆22Dec 11, 2022Updated 3 years ago
- ☆323Jan 13, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Sep 3, 2023Updated 2 years ago
- ☆37May 8, 2022Updated 3 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Report and exploit of CVE-2023-36427☆91Nov 22, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Recovering NTLM hashes from Credential Guard☆383Dec 26, 2022Updated 3 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆283Dec 5, 2023Updated 2 years ago
- ☆283Aug 30, 2022Updated 3 years ago
- ☆44Mar 16, 2024Updated 2 years ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆598Jan 31, 2025Updated last year
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,026Aug 29, 2023Updated 2 years ago