☆206Oct 27, 2024Updated last year
Alternatives and similar repositories for lexmark
Users that are interested in lexmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract HP printer ".bdl" firmware update files☆12Nov 15, 2017Updated 8 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆362Dec 19, 2022Updated 3 years ago
- ☆167Feb 29, 2024Updated 2 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- LPE exploit for CVE-2023-21768☆421Mar 8, 2023Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Oct 17, 2025Updated 5 months ago
- Foxit PDF Reader Remote Code Execution Exploit☆120Dec 5, 2023Updated 2 years ago
- ☆153May 26, 2022Updated 3 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- A public collection of POCs & Exploits for the vulnerabilities I discovered☆408Dec 31, 2025Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆705Nov 7, 2023Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆111May 12, 2023Updated 2 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated 2 years ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- ☆323Jan 13, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Sep 3, 2023Updated 2 years ago
- ☆37May 8, 2022Updated 3 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Report and exploit of CVE-2023-36427☆91Nov 22, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Recovering NTLM hashes from Credential Guard☆376Dec 26, 2022Updated 3 years ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆283Dec 5, 2023Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- ☆282Aug 30, 2022Updated 3 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,025Aug 29, 2023Updated 2 years ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆598Jan 31, 2025Updated last year
- ☆44Mar 16, 2024Updated 2 years ago