☆206Oct 27, 2024Updated last year
Alternatives and similar repositories for lexmark
Users that are interested in lexmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract HP printer ".bdl" firmware update files☆12Nov 15, 2017Updated 8 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- ☆168Feb 29, 2024Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆365Dec 19, 2022Updated 3 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- LPE exploit for CVE-2023-21768☆419Mar 8, 2023Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆60Oct 17, 2025Updated 6 months ago
- Foxit PDF Reader Remote Code Execution Exploit☆120Dec 5, 2023Updated 2 years ago
- ☆152May 26, 2022Updated 3 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- A public collection of POCs & Exploits for the vulnerabilities I discovered☆410Dec 31, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆708Nov 7, 2023Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆111May 12, 2023Updated 2 years ago
- Universal root exploit for the linux kernel☆37Apr 30, 2024Updated 2 years ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆22Dec 11, 2022Updated 3 years ago
- Fileless atexec, no more need for port 445☆407Mar 28, 2024Updated 2 years ago
- ☆323Jan 13, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Sep 3, 2023Updated 2 years ago
- ☆37May 8, 2022Updated 4 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Report and exploit of CVE-2023-36427☆91Nov 22, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆743May 19, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Recovering NTLM hashes from Credential Guard☆385Dec 26, 2022Updated 3 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated this week
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆283Dec 5, 2023Updated 2 years ago
- ☆285Aug 30, 2022Updated 3 years ago
- ☆44Mar 16, 2024Updated 2 years ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆599Jan 31, 2025Updated last year
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,028Aug 29, 2023Updated 2 years ago