Multiple Brother Devices: Multiple Vulnerabilities (CVE-2024-51977, CVE-2024-51978, CVE-2024-51979, CVE-2024-51980, CVE-2024-51981, CVE-2024-51982, CVE-2024-51983, CVE-2024-51984)
☆30Jun 30, 2025Updated 8 months ago
Alternatives and similar repositories for BrotherVulnerabilities
Users that are interested in BrotherVulnerabilities are comparing it to the libraries listed below
Sorting:
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- PoC for popping a system shell against the LnvMSRIO.sys driver☆119Oct 6, 2025Updated 5 months ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Rust crate to run commands as another user☆54Feb 12, 2026Updated last month
- Copyright@worstenbrood from XDA☆25May 9, 2022Updated 3 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- A cmake template for crystal palace☆39Dec 20, 2025Updated 3 months ago
- ☆13Mar 3, 2025Updated last year
- SOCKS5 and SOCKS4a proxy server☆16Aug 21, 2025Updated 7 months ago
- A deep dive into CVE-2025-49706 — the SharePoint spoofing flaw now exploited in the wild for stealthy web shell deployment and privilege …☆18Jul 20, 2025Updated 8 months ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in WinRAR versions 7.11 and under, involving improp…☆30Jul 1, 2025Updated 8 months ago
- Filesystem interaction via firebeam virtual machine execution☆34Mar 14, 2026Updated last week
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated 2 weeks ago
- An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain join…☆18Mar 15, 2023Updated 3 years ago
- Implementation of a scaled-down GPT-2-like transformer model written in BASIC optimized for 486-era PC hardware☆18May 18, 2025Updated 10 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- ☆11Apr 28, 2025Updated 10 months ago
- DLL injection with Microsoft detours☆22Dec 9, 2025Updated 3 months ago
- ☆13Apr 28, 2025Updated 10 months ago
- Jsfuck decryption implemented by pure Python code☆13Jul 22, 2019Updated 6 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- The Decompressoin tool for Vxworks MINIFS☆14May 18, 2021Updated 4 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- ☆49Apr 9, 2025Updated 11 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- ☆43Dec 24, 2025Updated 2 months ago
- Remove API hooks from a Beacon process.☆76Mar 13, 2022Updated 4 years ago
- ☆123Oct 9, 2023Updated 2 years ago
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆66Feb 23, 2026Updated 3 weeks ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 2 years ago