☆206Oct 27, 2024Updated last year
Alternatives and similar repositories for lexmark
Users that are interested in lexmark are comparing it to the libraries listed below
Sorting:
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- ☆168Feb 29, 2024Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- ☆223Oct 22, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 2 years ago
- LPE exploit for CVE-2023-21768☆420Mar 8, 2023Updated 2 years ago
- Extract HP printer ".bdl" firmware update files☆12Nov 15, 2017Updated 8 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆111May 12, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- ☆37May 8, 2022Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆121Dec 5, 2023Updated 2 years ago
- ☆323Jan 13, 2023Updated 3 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- A public collection of POCs & Exploits for the vulnerabilities I discovered☆407Dec 31, 2025Updated 2 months ago
- Sniffing files generator☆61Feb 24, 2025Updated last year
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆283Dec 5, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Sep 3, 2023Updated 2 years ago
- Default Detections for EDR☆97Feb 20, 2024Updated 2 years ago
- ☆153May 26, 2022Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆203Jun 7, 2023Updated 2 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Oct 17, 2025Updated 4 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- ☆707Nov 7, 2023Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- It stinks☆105Apr 22, 2022Updated 3 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,019Aug 29, 2023Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆676Dec 23, 2022Updated 3 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago