5f0ne / pdf-examinerLinks
Provides an overview of the inner file structure of a PDF
☆25Updated 3 years ago
Alternatives and similar repositories for pdf-examiner
Users that are interested in pdf-examiner are comparing it to the libraries listed below
Sorting:
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆16Updated 5 months ago
- ☆60Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Deployment code for ashirt-server☆20Updated this week
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- ☆15Updated 3 years ago
- ☆42Updated 6 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- self-hosted Azure OSINT tool☆31Updated 3 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- ☆16Updated 8 months ago
- wordlists for password cracking☆28Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- An Evil OIDC Server☆54Updated 2 years ago
- details about DIAL protocol vulnerabilities☆30Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- ☆15Updated 3 years ago
- ☆18Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago