blasty / lexmark
☆201Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for lexmark
- ☆209Updated 7 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆161Updated 8 months ago
- An automatic Blind ROP exploitation tool☆190Updated last year
- CVE-2023-4911 proof of concept☆163Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆216Updated 6 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆141Updated last year
- ☆123Updated last year
- ☆173Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆156Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆239Updated 9 months ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆267Updated 11 months ago
- ASLR bypass without infoleak☆152Updated 3 years ago
- Repository to store exploits created by Assetnotes Security Research team☆174Updated last year
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆130Updated 6 months ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆359Updated last year
- LPE exploit for CVE-2023-21768☆416Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆124Updated 8 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆83Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆189Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆91Updated last month
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆117Updated 2 years ago
- Decrypt encrypted Fortienet FortiOS firmware images☆97Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated last year
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆470Updated last month
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆112Updated 7 months ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆124Updated 8 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆96Updated 2 months ago
- ☆69Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆105Updated 8 months ago