CVEs and Techniques used PDF as an attack vector.
☆111Jul 5, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-T4PDF
Users that are interested in CVE-T4PDF are comparing it to the libraries listed below
Sorting:
- List of RegEx DoS (ReDoS) CVEs and resources☆29Feb 6, 2023Updated 3 years ago
- Demonstrate and showcasing how you can hide payload or secret message inside an image, audio, and PDF file and how an unethical person mi…☆12Jul 23, 2021Updated 4 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆29Mar 26, 2023Updated 2 years ago
- Repository aimed at helping to perform pentests on flutter applications☆18Jul 10, 2024Updated last year
- Cookie Crumbles: Breaking and Fixing Web Session Integrity☆24Aug 9, 2023Updated 2 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- ☆18Nov 7, 2024Updated last year
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆192Jun 7, 2024Updated last year
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- Inject a JS file into a PDF file.☆378Dec 11, 2019Updated 6 years ago
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- Attach an executable file and use JavaScript to download the attachment☆34May 9, 2019Updated 6 years ago
- ☆54Nov 5, 2024Updated last year
- This repo contains all the injections mentioned in my talk and enumerators.☆136Dec 1, 2023Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- This tool is used to handle firmware that binwalk cannot unpack directly and is mainly used for OOB removal, ECC removal, and bad block r…☆18Nov 14, 2022Updated 3 years ago
- ☆13May 18, 2022Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆284Aug 24, 2024Updated last year
- IDA helper plugin to reverse engineer Objective-C code☆44Jun 12, 2025Updated 9 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- TLS protocol scanner☆15Sep 27, 2022Updated 3 years ago
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆77Jan 24, 2025Updated last year
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 10 months ago
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆21Jan 13, 2025Updated last year
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Track Kubernetes CVEs by native GitHub notifications!☆13May 7, 2024Updated last year
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago