blasty / lexmarkLinks
☆207Updated last year
Alternatives and similar repositories for lexmark
Users that are interested in lexmark are comparing it to the libraries listed below
Sorting:
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- ☆215Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- ☆279Updated 3 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- ☆131Updated 2 years ago
- PoC_CVEs☆169Updated 2 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 5 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆168Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆113Updated 8 months ago
- Collected && Written N day Vulns for study purpose only☆109Updated last month
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- ☆179Updated 2 years ago
- ☆152Updated 2 years ago
- xortigate-cve-2023-27997☆65Updated 2 years ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆283Updated 2 years ago
- Decrypt encrypted Fortienet FortiOS firmware images☆142Updated 2 years ago
- LPE exploit for CVE-2023-21768☆421Updated 2 years ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆142Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- Comprehensive toolkit for Ghidra headless.☆363Updated 9 months ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- ASLR bypass without infoleak☆167Updated 4 years ago
- ☆177Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆202Updated 2 years ago