blasty / lexmarkLinks
☆206Updated 11 months ago
Alternatives and similar repositories for lexmark
Users that are interested in lexmark are comparing it to the libraries listed below
Sorting:
- ☆216Updated last year
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- CVE-2023-4911 proof of concept☆168Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆220Updated last year
- PoC_CVEs☆163Updated last week
- ☆128Updated last year
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- ☆277Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated last month
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆164Updated last year
- Collected && Written N day Vulns for study purpose only☆105Updated 3 months ago
- xortigate-cve-2023-27997☆64Updated last year
- ☆178Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆126Updated 4 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆107Updated 4 months ago
- Decrypt encrypted Fortienet FortiOS firmware images☆135Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆199Updated 2 years ago
- Comprehensive toolkit for Ghidra headless.☆359Updated 5 months ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆274Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- ☆104Updated 8 months ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆140Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- eBPF hacks☆187Updated 9 months ago