t3l3machus / CVE-2023-22960View external linksLinks
This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.
☆90Jul 19, 2024Updated last year
Alternatives and similar repositories for CVE-2023-22960
Users that are interested in CVE-2023-22960 are comparing it to the libraries listed below
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Jul 19, 2024Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- ☆26Jun 24, 2025Updated 7 months ago
- ☆27May 1, 2023Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Jul 19, 2024Updated last year
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.