blasty / lexmarkLinks
☆204Updated 8 months ago
Alternatives and similar repositories for lexmark
Users that are interested in lexmark are comparing it to the libraries listed below
Sorting:
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- ☆215Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- CVE-2023-4911 proof of concept☆168Updated last year
- PoC_CVEs☆163Updated last week
- ☆123Updated last year
- ☆277Updated 2 years ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆163Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆84Updated 2 years ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆273Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated last year
- ☆179Updated 2 years ago
- Repository to store exploits created by Assetnotes Security Research team☆179Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆136Updated 2 years ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆137Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆119Updated last month
- LPE exploit for CVE-2023-21768☆421Updated 2 years ago
- Collected && Written N day Vulns for study purpose only☆105Updated 2 weeks ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆103Updated last month
- ☆244Updated 2 years ago
- Decrypt encrypted Fortienet FortiOS firmware images☆129Updated last year
- Comprehensive toolkit for Ghidra headless.☆358Updated 2 months ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆202Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆270Updated 4 months ago
- reverse shell using curl☆206Updated 4 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year