breenmachine / HPwn
HP printer security research code
☆52Updated 6 years ago
Related projects: ⓘ
- HP printer security research code☆89Updated 6 years ago
- public exploits☆35Updated last year
- ☆34Updated 5 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆66Updated 4 years ago
- ☆65Updated this week
- A template project for creating a shellcode for the Cisco IOS in the C language☆33Updated 6 years ago
- ☆58Updated 4 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Updated 7 years ago
- ☆79Updated this week
- Remote Java classpath enumeration via deserialization☆23Updated last year
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- Metasploit Framework☆31Updated 4 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 7 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 5 years ago
- CVE-2018-8440 standalone exploit☆79Updated 5 years ago
- Repository containing many useful scripts☆72Updated 2 years ago
- Proof of calc for CVE-2019-6453☆50Updated 8 months ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆21Updated 5 years ago
- sploit☆67Updated 4 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- ☆22Updated this week
- Security Research☆36Updated 2 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- Unified repository for different Metasploit Framework payloads☆47Updated 4 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- ☆49Updated 5 years ago