foxglovesec / HPwn
HP printer security research code
☆89Updated 6 years ago
Related projects: ⓘ
- public exploits☆35Updated last year
- Test and exploit for CVE-2017-12542☆84Updated 6 years ago
- ☆132Updated this week
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- ☆75Updated this week
- Ye olde root shell for ye olde httpd☆43Updated 9 years ago
- Proof of Concept exploit for CVE-2017-8570☆185Updated 6 years ago
- HP printer security research code☆52Updated 6 years ago
- CVE-2018-8440 standalone exploit☆79Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆107Updated 5 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆108Updated 6 years ago
- Proof of calc for CVE-2019-6453☆50Updated 8 months ago
- ☆62Updated this week
- A weaponized version of CVE-2018-9206☆62Updated 5 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆99Updated 6 years ago
- ☆67Updated this week
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆83Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆173Updated 7 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- ☆70Updated this week
- ☆24Updated 8 years ago
- ☆81Updated 10 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- Wraps sudo; transparently steals user's credentials and exfiltrate over DNS. For those annoying times when you get a shell/file write on …☆35Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆84Updated 5 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆98Updated 6 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆108Updated 3 years ago