blasty / printer-cracktroLinks
☆37Updated 2 years ago
Alternatives and similar repositories for printer-cracktro
Users that are interested in printer-cracktro are comparing it to the libraries listed below
Sorting:
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 6 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- ☆33Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- A collection of various exploits☆28Updated 9 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- ☆34Updated last year
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- HN Security's advisories.☆22Updated 2 months ago
- PoC code and tools for Black Hat USA 2024☆21Updated 10 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 6 months ago
- Collection of slides☆33Updated last year
- Analysis of the vulnerability☆51Updated last year
- ☆48Updated 4 years ago
- ☆14Updated 3 years ago
- ☆11Updated 4 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- A simple but useful project maybe help you reverse Windows.☆38Updated last year
- ☆24Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- PyKD DLLs for x86 and x64 platforms☆17Updated last year
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- ☆28Updated 7 months ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year