Malicious PDF document parsing tool
☆16Nov 1, 2017Updated 8 years ago
Alternatives and similar repositories for PDFTear
Users that are interested in PDFTear are comparing it to the libraries listed below
Sorting:
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- Analysis Financial Attacker Groups, 金融行业攻击者团伙研究☆23Jun 24, 2021Updated 4 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- Parse and stringify URL query strings☆13Aug 1, 2018Updated 7 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- Jumbo Python Penetration testing framework☆32Nov 28, 2018Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- 自动化被动扫描系统分为数据源、数据处理、漏洞验证等三个子系统,本系统属于漏洞验证部分,根据提供的数据进行分布式安全验证,确定是否包含相关严重漏洞。☆49Dec 26, 2017Updated 8 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- ☆28Jul 18, 2020Updated 5 years ago
- Proof of Concepts of vulnerabilities discovered by me☆11Jan 24, 2024Updated 2 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- Using Windows Hook to make a CLI WebShellKill☆45Feb 4, 2019Updated 7 years ago
- 就是一个练习Java反序列化的最简单环境☆14Dec 24, 2021Updated 4 years ago
- Environment for DynoRoot (CVE-2018-1111)☆13May 17, 2018Updated 7 years ago
- 用Golang完成的一个 识别沙箱检测 的小demo!☆16Sep 17, 2021Updated 4 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- 与反病毒软件老大哥们的打闹日常☆135Nov 8, 2018Updated 7 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago