breenmachine / HPwnLinks
HP printer security research code
☆53Updated 7 years ago
Alternatives and similar repositories for HPwn
Users that are interested in HPwn are comparing it to the libraries listed below
Sorting:
- HP printer security research code☆91Updated 7 years ago
- Metasploit Framework☆31Updated 5 years ago
- ☆34Updated 6 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- ☆62Updated 4 years ago
- ☆22Updated 9 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆68Updated 5 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- public exploits☆35Updated 2 years ago
- CVE-2019-12949☆26Updated 5 years ago
- Security Research☆36Updated 3 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 5 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- sploit☆68Updated 5 years ago
- Data exfiltration using reflective DNS resolution covert channel☆52Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- with metasploit☆63Updated 5 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago