LICENSE
MANIFEST.in
README.md
config.json.example
pyproject.toml
requirements.txt
run.ps1
run.sh
setup.cfg
setup.py
./nse/README.md
./nse/__init__.py
./nse/install_nse.py
./nse/lib/printerxpl.lua
./nse/scripts/cups-info.nse
./nse/scripts/cups-queue-info.nse
./nse/scripts/hp-printers-cve-2022-1026.nse
./nse/scripts/http-device-mac.nse
./nse/scripts/http-hp-ilo-info.nse
./nse/scripts/http-info-xerox-enum.nse
./nse/scripts/http-vuln-cve2022-1026.nse
./nse/scripts/lexmark-config.nse
./nse/scripts/pjl-ready-message.nse
./nse/scripts/printer-banner.nse
./nse/scripts/printer-cups-rce.nse
./nse/scripts/printer-cve-detect.nse
./nse/scripts/printer-discover.nse
./nse/scripts/printer-firmware-exposed.nse
./nse/scripts/printer-hp-pjl.nse
./nse/scripts/printer-http-ews.nse
./nse/scripts/printer-ipp-info.nse
./nse/scripts/printer-lexmark-ipp.nse
./nse/scripts/printer-passback.nse
./nse/scripts/printer-pjl-info.nse
./nse/scripts/printer-printnightmare.nse
./nse/scripts/printer-snmp-info.nse
./nse/scripts/printer-vuln-check.nse
./nse/scripts/snmp-device-mac.nse
./nse/scripts/snmp-info.nse
./nse/scripts/snmp-sysdescr.nse
./src/main.py
./src/version.py
./src/assets/fonts/gunplay.pfa
./src/assets/fonts/kshandwrt.pfa
./src/assets/fonts/laksoner.pfa
./src/assets/fonts/paintcans.pfa
./src/assets/fonts/stencilod.pfa
./src/assets/fonts/takecover.pfa
./src/assets/fonts/topsecret.pfa
./src/assets/fonts/whoa.pfa
./src/assets/mibs/HOST-RESOURCES-MIB
./src/assets/mibs/Printer-MIB
./src/assets/mibs/README.md
./src/assets/mibs/SNMPv2-MIB
./src/assets/overlays/hacker.eps
./src/assets/overlays/smiley.eps
./src/assets/overlays/smiley2.eps
./src/core/attack_orchestrator.py
./src/core/capabilities.py
./src/core/destructive_audit.py
./src/core/discovery.py
./src/core/osdetect.py
./src/core/poly_runner.py
./src/core/printer.py
./src/modules/install_printer.py
./src/modules/login_bruteforce.py
./src/modules/pcl.py
./src/modules/pjl.py
./src/modules/print_job.py
./src/modules/ps.py
./src/payloads/__init__.py
./src/payloads/assets/overlays/notice.eps
./src/protocols/__init__.py
./src/protocols/firmware.py
./src/protocols/ipp.py
./src/protocols/ipp_attacks.py
./src/protocols/lpd.py
./src/protocols/network_map.py
./src/protocols/raw.py
./src/protocols/smb.py
./src/protocols/ssrf_pivot.py
./src/protocols/storage.py
./src/ui/__init__.py
./src/ui/interactive.py
./src/ui/spinner.py
./src/ui/tables.py
./src/utils/banner_grabber.py
./src/utils/codebook.py
./src/utils/config.py
./src/utils/cve_loader.py
./src/utils/default_creds.py
./src/utils/discovery_online.py
./src/utils/exploit_manager.py
./src/utils/fuzzer.py
./src/utils/helper.py
./src/utils/local_printers.py
./src/utils/ml_engine.py
./src/utils/operators.py
./src/utils/ports.py
./src/utils/vuln_scanner.py
./src/utils/wordlist_loader.py
diagrams/architecture_ascii_visual.mmd
diagrams/architecture_layered.mmd
diagrams/attack_matrix.drawio
diagrams/command_flow.mmd
diagrams/credential_flow.drawio
diagrams/engines.mmd
diagrams/mermaid-config.json
diagrams/overview_for_dummies.mmd
diagrams/printerxpl_forge_workflow.drawio
diagrams/protocol_stack.mmd
diagrams/security_testing_flow.mmd
man/man1/printerxpl-forge.1
nse/README.md
nse/__init__.py
nse/install_nse.py
nse/lib/printerxpl.lua
nse/scripts/cups-info.nse
nse/scripts/cups-queue-info.nse
nse/scripts/hp-printers-cve-2022-1026.nse
nse/scripts/http-device-mac.nse
nse/scripts/http-hp-ilo-info.nse
nse/scripts/http-info-xerox-enum.nse
nse/scripts/http-vuln-cve2022-1026.nse
nse/scripts/lexmark-config.nse
nse/scripts/pjl-ready-message.nse
nse/scripts/printer-banner.nse
nse/scripts/printer-cups-rce.nse
nse/scripts/printer-cve-detect.nse
nse/scripts/printer-discover.nse
nse/scripts/printer-firmware-exposed.nse
nse/scripts/printer-hp-pjl.nse
nse/scripts/printer-http-ews.nse
nse/scripts/printer-ipp-info.nse
nse/scripts/printer-lexmark-ipp.nse
nse/scripts/printer-passback.nse
nse/scripts/printer-pjl-info.nse
nse/scripts/printer-printnightmare.nse
nse/scripts/printer-snmp-info.nse
nse/scripts/printer-vuln-check.nse
nse/scripts/snmp-device-mac.nse
nse/scripts/snmp-info.nse
nse/scripts/snmp-sysdescr.nse
packages/man/printerxpl-forge.1
src/main.py
src/version.py
src/assets/fonts/gunplay.pfa
src/assets/fonts/kshandwrt.pfa
src/assets/fonts/laksoner.pfa
src/assets/fonts/paintcans.pfa
src/assets/fonts/stencilod.pfa
src/assets/fonts/takecover.pfa
src/assets/fonts/topsecret.pfa
src/assets/fonts/whoa.pfa
src/assets/mibs/HOST-RESOURCES-MIB
src/assets/mibs/Printer-MIB
src/assets/mibs/README.md
src/assets/mibs/SNMPv2-MIB
src/assets/overlays/hacker.eps
src/assets/overlays/smiley.eps
src/assets/overlays/smiley2.eps
src/core/attack_orchestrator.py
src/core/capabilities.py
src/core/destructive_audit.py
src/core/discovery.py
src/core/osdetect.py
src/core/poly_runner.py
src/core/printer.py
src/modules/install_printer.py
src/modules/login_bruteforce.py
src/modules/pcl.py
src/modules/pjl.py
src/modules/print_job.py
src/modules/ps.py
src/payloads/__init__.py
src/payloads/assets/overlays/notice.eps
src/protocols/__init__.py
src/protocols/firmware.py
src/protocols/ipp.py
src/protocols/ipp_attacks.py
src/protocols/lpd.py
src/protocols/network_map.py
src/protocols/raw.py
src/protocols/smb.py
src/protocols/ssrf_pivot.py
src/protocols/storage.py
src/ui/__init__.py
src/ui/interactive.py
src/ui/spinner.py
src/ui/tables.py
src/utils/banner_grabber.py
src/utils/codebook.py
src/utils/config.py
src/utils/cve_loader.py
src/utils/default_creds.py
src/utils/discovery_online.py
src/utils/exploit_manager.py
src/utils/fuzzer.py
src/utils/helper.py
src/utils/local_printers.py
src/utils/ml_engine.py
src/utils/operators.py
src/utils/ports.py
src/utils/vuln_scanner.py
src/utils/wordlist_loader.py
wordlists/README.txt
wordlists/default_creds.txt
wordlists/ftp_creds.txt
wordlists/pjl_passwords.txt
wordlists/printer_default_creds.txt
wordlists/printer_models.txt
wordlists/snmp_communities.txt
xpl/index.json
xpl/custom/TEMPLATE.py
xpl/edb-15631/exploit.py
xpl/edb-15631/metadata.json
xpl/edb-17636/exploit.py
xpl/edb-17636/metadata.json
xpl/edb-20565/exploit.py
xpl/edb-20565/metadata.json
xpl/edb-22319/exploit.py
xpl/edb-23147/exploit.py
xpl/edb-35151/exploit.py
xpl/edb-35151/metadata.json
xpl/edb-36608/exploit.py
xpl/edb-36913/exploit.py
xpl/edb-37956/exploit.py
xpl/edb-40909/exploit.py
xpl/edb-41920/exploit.py
xpl/edb-43178/exploit.py
xpl/edb-45205/exploit.py
xpl/edb-45273/exploit.py
xpl/edb-45273/metadata.json
xpl/edb-47812/exploit.py
xpl/edb-47850/exploit.py
xpl/edb-47850/metadata.json
xpl/edb-49140/exploit.py
xpl/edb-50078/exploit.py
xpl/edb-50498/exploit.py
xpl/edb-51191/exploit.py
xpl/edb-51606/exploit.py
xpl/edb-51755/exploit.py
xpl/edb-51928/exploit.py
xpl/edb-cve-2011-4065/exploit.py
xpl/edb-cve-2011-4065/metadata.json
xpl/edb-cve-2016-11061/exploit.py
xpl/edb-cve-2016-11061/metadata.json
xpl/edb-cve-2017-2741/exploit.py
xpl/edb-cve-2018-5924/exploit.py
xpl/edb-cve-2019-14308/exploit.py
xpl/edb-cve-2019-14308/metadata.json
xpl/edb-cve-2020-1337/exploit.py
xpl/edb-cve-2021-3441/exploit.py
xpl/edb-cve-2021-3441/metadata.json
xpl/edb-cve-2022-1026/exploit.py
xpl/edb-cve-2022-24673/exploit.py
xpl/edb-cve-2023-26067/exploit.py
xpl/edb-cve-2023-3710/exploit.py
xpl/edb-cve-2023-3710/metadata.json
xpl/edb-cve-2023-50733/exploit.py
xpl/edb-cve-2023-50739/exploit.py
xpl/edb-cve-2024-47176/exploit.py
xpl/edb-cve-2024-51977/exploit.py
xpl/edb-cve-2024-51978/exploit.py
xpl/edb-cve-2024-51978/metadata.json
xpl/edb-cve-2024-6333/exploit.py
xpl/edb-cve-2025-26506/exploit.py
xpl/edb-cve-2025-26508/exploit.py
xpl/edb-cve-2025-26508/metadata.json
xpl/msf-brother-default-auth-bypass/exploit.py
xpl/msf-canon-driver-privesc/exploit.py
xpl/msf-canon-wireless-dos/exploit.py
xpl/msf-cups-ipp-rce/exploit.py
xpl/msf-cve-2020-1048-printerdemon/exploit.py
xpl/msf-hp-jetdirect-path-traversal/exploit.py
xpl/msf-hp-pjl-scan/exploit.py
xpl/msf-lexmark-cred-dump/exploit.py
xpl/msf-printer-to-pdf/exploit.py
xpl/msf-printjob-capture/exploit.py
xpl/msf-ricoh-driver-privesc/exploit.py
xpl/msf-snmp-hp-laserjet/exploit.py
xpl/msf-spoolfool-privesc/exploit.py
xpl/msf/msf-hp-web-jetadmin-rce/exploit.py
xpl/msf/msf-ipp-printer-check/exploit.py
xpl/msf/msf-printer-dir-list/exploit.py
xpl/msf/msf-printer-env-vars/exploit.py
xpl/msf/msf-printer-file-download/exploit.py
xpl/msf/msf-printer-file-upload/exploit.py
xpl/msf/msf-printer-info/exploit.py
xpl/msf/msf-ricoh-loginout-dos/exploit.py
xpl/msf/msf-snmp-printer-enum/exploit.py
xpl/research/research-bizhub-user-extract/exploit.py
xpl/research/research-brother-fw-upload/exploit.py
xpl/research/research-brother-nvram/exploit.py
xpl/research/research-brother-passback/exploit.py
xpl/research/research-brother-passback/metadata.json
xpl/research/research-brother-serial-pwd/exploit.py
xpl/research/research-brother-vuln-enum/exploit.py
xpl/research/research-brother-wsd-dos/exploit.py
xpl/research/research-brother-wsd-dos/metadata.json
xpl/research/research-brother-wsd-ssrf/exploit.py
xpl/research/research-brother-wsd-ssrf/metadata.json
xpl/research/research-canon-ldif-extract/exploit.py
xpl/research/research-canon-pcl-bof/exploit.py
xpl/research/research-canon-pixma-fw/exploit.py
xpl/research/research-canon-ps-bof/exploit.py
xpl/research/research-canon-xps-bof-2025b/exploit.py
xpl/research/research-canon-xps-bof-2025b/metadata.json
xpl/research/research-cups-chain-2026/exploit.py
xpl/research/research-cups-chain-2026-34980/exploit.py
xpl/research/research-cups-chain-2026-34980/metadata.json
xpl/research/research-cups-nofaxgiven/exploit.py
xpl/research/research-cups-pwn2own-2026-chain/exploit.py
xpl/research/research-cups-pwn2own-2026-chain/metadata.json
xpl/research/research-cups-pwn2own-2026-stage1/exploit.py
xpl/research/research-cups-pwn2own-2026-stage1/metadata.json
xpl/research/research-cups-pwn2own-2026-stage2/exploit.py
xpl/research/research-cups-pwn2own-2026-stage2/metadata.json
xpl/research/research-cups-pwn2own-2026-stage3/exploit.py
xpl/research/research-cups-pwn2own-2026-stage3/metadata.json
xpl/research/research-cups-root-2026/exploit.py
xpl/research/research-cve-2024-51982/exploit.py
xpl/research/research-dell-b5460-enum/__init__.py
xpl/research/research-dell-b5460-enum/exploit.py
xpl/research/research-dell-mfp-enum/exploit.py
xpl/research/research-epson-connect-cloud/exploit.py
xpl/research/research-epson-fw-unsigned/exploit.py
xpl/research/research-epson-lpd-unauth/exploit.py
xpl/research/research-epson-noauth-disclosure/exploit.py
xpl/research/research-fax-config-exfil/__init__.py
xpl/research/research-fax-config-exfil/exploit.py
xpl/research/research-fax-dll-inject/exploit.py
xpl/research/research-ftp-printer-grab/__init__.py
xpl/research/research-ftp-printer-grab/exploit.py
xpl/research/research-fuser-thermal-attack/exploit.py
xpl/research/research-generic-pjl-nvram/exploit.py
xpl/research/research-gooseegg-spooler/exploit.py
xpl/research/research-hp-bof-series-2022/exploit.py
xpl/research/research-hp-bof-series-2022/metadata.json
xpl/research/research-hp-disk-access/exploit.py
xpl/research/research-hp-disk-access/metadata.json
xpl/research/research-hp-efi-rootkit/exploit.py
xpl/research/research-hp-efi-rootkit/metadata.json
xpl/research/research-hp-ews-ssrf-2024-4479/exploit.py
xpl/research/research-hp-ews-ssrf-2024-4479/metadata.json
xpl/research/research-hp-futuresmart-leak/exploit.py
xpl/research/research-hp-fw-auth-bypass-2023-6018/exploit.py
xpl/research/research-hp-fw-auth-bypass-2023-6018/metadata.json
xpl/research/research-hp-fw-bypass/exploit.py
xpl/research/research-hp-fw-extract/exploit.py
xpl/research/research-hp-mfp-bof-2021-39237/exploit.py
xpl/research/research-hp-mfp-bof-2021-39237/metadata.json
xpl/research/research-hp-pagewide-ssrf-2017-2750/exploit.py
xpl/research/research-hp-pagewide-ssrf-2017-2750/metadata.json
xpl/research/research-hp-pjl-traversal-2010-4107/exploit.py
xpl/research/research-hp-pjl-traversal-2010-4107/metadata.json
xpl/research/research-hp-printing-shellz/exploit.py
xpl/research/research-hp-printing-shellz/metadata.json
xpl/research/research-hp-uart-bof-2022-3942/exploit.py
xpl/research/research-hp-uart-bof-2022-3942/metadata.json
xpl/research/research-hp-xps-bof/exploit.py
xpl/research/research-ipp-anon-inject/__init__.py
xpl/research/research-ipp-anon-inject/exploit.py
xpl/research/research-ipp-evil-twin/__init__.py
xpl/research/research-ipp-evil-twin/exploit.py
xpl/research/research-ipp-fuzz-enum/exploit.py
xpl/research/research-ipp-print-uri-ssrf/__init__.py
xpl/research/research-ipp-print-uri-ssrf/exploit.py
xpl/research/research-ipp-purge-dos/__init__.py
xpl/research/research-ipp-purge-dos/exploit.py
xpl/research/research-konica-fw-upload/exploit.py
xpl/research/research-konica-soap-extract/exploit.py
xpl/research/research-kyocera-pjl-creds/exploit.py
xpl/research/research-kyocera-pjl-creds/metadata.json
xpl/research/research-laser-scanner-attack/exploit.py
xpl/research/research-ldap-hash-capture/exploit.py
xpl/research/research-ldap-hash-capture/metadata.json
xpl/research/research-lexmark-cve-2023-26067/exploit.py
xpl/research/research-lexmark-fw-decrypt/exploit.py
xpl/research/research-lexmark-fw-downgrade/exploit.py
xpl/research/research-lexmark-fw-downgrade/metadata.json
xpl/research/research-lexmark-heap-bof/exploit.py
xpl/research/research-lexmark-heap-bof/metadata.json
xpl/research/research-lexmark-ps-bof-50734/exploit.py
xpl/research/research-lexmark-ps-bof-50734/metadata.json
xpl/research/research-lexmark-ps-bof-50736/exploit.py
xpl/research/research-lexmark-ps-bof-50736/metadata.json
xpl/research/research-lexmark-pwn2own-2026/exploit.py
xpl/research/research-lexmark-pwn2own-2026/metadata.json
xpl/research/research-lexmark-ssrf-rce-2023-23560/exploit.py
xpl/research/research-lexmark-ssrf-rce-2023-23560/metadata.json
xpl/research/research-mirage-rogue-ldap/exploit.py
xpl/research/research-mirai-printer-scan/exploit.py
xpl/research/research-motor-jam-attack/exploit.py
xpl/research/research-ms-rprn-coerce/exploit.py
xpl/research/research-nmap-printer-nse/exploit.py
xpl/research/research-nse-compat/exploit.py
xpl/research/research-oki-b432-config-dump/__init__.py
xpl/research/research-oki-b432-config-dump/exploit.py
xpl/research/research-papercut-pjl-scanner/exploit.py
xpl/research/research-pjl-nvram-damage/exploit.py
xpl/research/research-pjl-pwd-disclosure/__init__.py
xpl/research/research-pjl-pwd-disclosure/exploit.py
xpl/research/research-praeda-mfp-harvest/exploit.py
xpl/research/research-pret-2.0-wrapper/exploit.py
xpl/research/research-pret-wrapper/exploit.py
xpl/research/research-print-track-steg/exploit.py
xpl/research/research-print-track-steg/metadata.json
xpl/research/research-printer-c2-dns/exploit.py
xpl/research/research-printer-c2-dns/metadata.json
xpl/research/research-printer-c2-http/exploit.py
xpl/research/research-printer-c2-http/metadata.json
xpl/research/research-printer-c2-smb/exploit.py
xpl/research/research-printer-c2-smb/metadata.json
xpl/research/research-printer-fw-tamper/exploit.py
xpl/research/research-printer-fw-tamper/metadata.json
xpl/research/research-printer-grpc-shell/exploit.py
xpl/research/research-printer-iot-lateral/exploit.py
xpl/research/research-printer-iot-lateral/metadata.json
xpl/research/research-printer-net-reconn/exploit.py
xpl/research/research-printer-net-reconn/metadata.json
xpl/research/research-printnightmare/exploit.py
xpl/research/research-ps-dos/exploit.py
xpl/research/research-ps-filesystem/exploit.py
xpl/research/research-ps-infinite-loop/exploit.py
xpl/research/research-ps-job-capture/exploit.py
xpl/research/research-ps-lang-abuse/exploit.py
xpl/research/research-ps-lang-abuse/metadata.json
xpl/research/research-ps-overlay-watermark/exploit.py
xpl/research/research-ps-overlay-watermark/metadata.json
xpl/research/research-pyrrha-fw-analysis/exploit.py
xpl/research/research-rfid-badge-exfil/exploit.py
xpl/research/research-rfid-badge-exfil/metadata.json
xpl/research/research-ricoh-driver-lpe-2019-19363/exploit.py
xpl/research/research-ricoh-driver-lpe-2019-19363/metadata.json
xpl/research/research-ricoh-ews-rce/exploit.py
xpl/research/research-ricoh-ews-rce-2024-34161/exploit.py
xpl/research/research-ricoh-ews-rce-2024-34161/metadata.json
xpl/research/research-ricoh-fw-unsigned/exploit.py
xpl/research/research-ricoh-http-bof/exploit.py
xpl/research/research-ricoh-http-bof/metadata.json
xpl/research/research-ricoh-http-bof-2024-34161/exploit.py
xpl/research/research-ricoh-http-bof-2024-34161/metadata.json
xpl/research/research-ricoh-ldap-passback/exploit.py
xpl/research/research-ricoh-web-cmdinject/exploit.py
xpl/research/research-ricoh-wpa-bof/exploit.py
xpl/research/research-sharp-rce/exploit.py
xpl/research/research-sharp-smtp-passback/exploit.py
xpl/research/research-shodan-mass-discovery/exploit.py
xpl/research/research-smartcard-printer-bypass/exploit.py
xpl/research/research-smartcard-printer-bypass/metadata.json
xpl/research/research-smb-auth-relay-print/exploit.py
xpl/research/research-smb-auth-relay-print/metadata.json
xpl/research/research-snmp-factory-reset/exploit.py
xpl/research/research-ssport-lpe/exploit.py
xpl/research/research-ssport-lpe/metadata.json
xpl/research/research-tftp-loop-dos/exploit.py
xpl/research/research-tftp-loop-dos/metadata.json
xpl/research/research-thermal-printer-rprint/exploit.py
xpl/research/research-thermal-printer-rprint/metadata.json
xpl/research/research-toshiba-auth-bypass/exploit.py
xpl/research/research-universal-printer-enum/exploit.py
xpl/research/research-universal-printer-enum/metadata.json
xpl/research/research-wifi-printer-survey/exploit.py
xpl/research/research-wsd-enum/__init__.py
xpl/research/research-wsd-enum/exploit.py
xpl/research/research-xerox-altalink-unauth-2022-23968/exploit.py
xpl/research/research-xerox-altalink-unauth-2022-23968/metadata.json
xpl/research/research-xerox-firmware-root/exploit.py
xpl/research/research-xerox-http-bof/exploit.py
xpl/research/research-xerox-http-bof/metadata.json
xpl/research/research-xerox-ipp-bof/exploit.py
xpl/research/research-xerox-ipp-bof/metadata.json
xpl/research/research-xerox-passback/exploit.py
xpl/research/research-xerox-pjl-dlm/exploit.py
xpl/research/research-xerox-workcentre-cmdinject/exploit.py
xpl/research/research-xsp-beef/exploit.py
xpl/research/research-zerologon-printserver/exploit.py
xpl/research/research-zerologon-printserver/metadata.json