blasty / lexmark
☆201Updated 3 months ago
Alternatives and similar repositories for lexmark:
Users that are interested in lexmark are comparing it to the libraries listed below
- ☆210Updated 10 months ago
- An automatic Blind ROP exploitation tool☆196Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆144Updated 2 years ago
- ☆122Updated last year
- CVE-2023-4911 proof of concept☆167Updated last year
- ☆88Updated last month
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆164Updated 10 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated 9 months ago
- ☆176Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆174Updated last year
- ☆275Updated 2 years ago
- LPE exploit for CVE-2023-21768☆416Updated last year
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆269Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆241Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated 11 months ago
- PoC_CVEs☆159Updated last month
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆158Updated last year
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆130Updated 9 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆240Updated 3 months ago
- ☆146Updated 10 months ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆182Updated last year
- LPE exploit for CVE-2023-21768☆486Updated last year
- Decrypt encrypted Fortienet FortiOS firmware images☆106Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 5 months ago
- Write ups for Ph0wn CTF☆41Updated 2 months ago
- ☆168Updated last year
- nysm is a stealth post-exploitation container.☆243Updated last year